]> andersk Git - openssh.git/blame - ChangeLog
- (djm) [auth.c] Missing unistd.h for close()
[openssh.git] / ChangeLog
CommitLineData
17969fcc 120080709
2 - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass
b5fc5d94 3 - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM
4 account check failure path. The vulnerable format buffer is supplied
5 from PAM and should not contain attacker-supplied data.
78cb4705 6 - (djm) [auth.c] Missing unistd.h for close()
17969fcc 7
3fde0623 820080705
9 - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed
10 passwords disabled. bz#1083 report & patch from senthilkumar_sen AT
11 hotpop.com, w/ dtucker@
e8983917 12 - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for
13 Tru64. readv doesn't seem to be a comparable object there.
14 bz#1386, patch from dtucker@ ok me
b8d635d0 15 - (djm) [Makefile.in] Pass though pass to conch for interop tests
6ed8a3ae 16 - (djm) [configure.ac] unbreak: remove extra closing brace
d38d9a80 17 - (djm) OpenBSD CVS Sync
18 - djm@cvs.openbsd.org 2008/07/04 23:08:25
19 [packet.c]
20 handle EINTR in packet_write_poll()l ok dtucker@
71709bcd 21 - djm@cvs.openbsd.org 2008/07/04 23:30:16
22 [auth1.c auth2.c]
23 Make protocol 1 MaxAuthTries logic match protocol 2's.
24 Do not treat the first protocol 2 authentication attempt as
25 a failure IFF it is for method "none".
26 Makes MaxAuthTries' user-visible behaviour identical for
27 protocol 1 vs 2.
28 ok dtucker@
3086db6e 29 - djm@cvs.openbsd.org 2008/07/05 05:16:01
30 [PROTOCOL]
31 grammar
3fde0623 32
a0d38609 3320080704
34 - (dtucker) OpenBSD CVS Sync
35 - djm@cvs.openbsd.org 2008/07/02 13:30:34
36 [auth2.c]
37 really really remove the freebie "none" auth try for protocol 2
6c777090 38 - djm@cvs.openbsd.org 2008/07/02 13:47:39
39 [ssh.1 ssh.c]
40 When forking after authentication ("ssh -f") with ExitOnForwardFailure
41 enabled, delay the fork until after replies for any -R forwards have
42 been seen. Allows for robust detection of -R forward failure when
43 using -f (similar to bz#92); ok dtucker@
f0b9fde3 44 - otto@cvs.openbsd.org 2008/07/03 21:46:58
45 [auth2-pubkey.c]
46 avoid nasty double free; ok dtucker@ djm@
cece208b 47 - djm@cvs.openbsd.org 2008/07/04 03:44:59
48 [servconf.c groupaccess.h groupaccess.c]
49 support negation of groups in "Match group" block (bz#1315); ok dtucker@
c54d3d1c 50 - dtucker@cvs.openbsd.org 2008/07/04 03:47:02
51 [monitor.c]
52 Make debug a little clearer. ok djm@
c7cbf377 53 - djm@cvs.openbsd.org 2008/06/30 08:07:34
54 [regress/key-options.sh]
55 shell portability: use "=" instead of "==" in test(1) expressions,
56 double-quote string with backslash escaped /
8a972082 57 - djm@cvs.openbsd.org 2008/06/30 10:31:11
58 [regress/{putty-transfer,putty-kex,putty-ciphers}.sh]
59 remove "set -e" left over from debugging
9b0c87d9 60 - djm@cvs.openbsd.org 2008/06/30 10:43:03
61 [regress/conch-ciphers.sh]
62 explicitly disable conch options that could interfere with the test
97e61398 63 - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link
64 returns EXDEV. Patch from Mike Garrison, ok djm@
5a0c8771 65 - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h]
66 [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c]
67 [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on
68 some platforms (HP nonstop) it is a distinct errno;
69 bz#1467 reported by sconeu AT yahoo.com; ok dtucker@
70
8f02e0be 7120080702
72 - (dtucker) OpenBSD CVS Sync
73 - djm@cvs.openbsd.org 2008/06/30 08:05:59
74 [PROTOCOL.agent]
75 typo: s/constraint_date/constraint_data/
fb5582f7 76 - djm@cvs.openbsd.org 2008/06/30 12:15:39
77 [serverloop.c]
78 only pass channel requests on session channels through to the session
79 channel handler, avoiding spurious log messages; ok! markus@
4d92dbc1 80 - djm@cvs.openbsd.org 2008/06/30 12:16:02
81 [nchan.c]
82 only send eow@openssh.com notifications for session channels; ok! markus@
8fb1ddc9 83 - djm@cvs.openbsd.org 2008/06/30 12:18:34
84 [PROTOCOL]
85 clarify that eow@openssh.com is only sent on session channels
979b31ed 86 - dtucker@cvs.openbsd.org 2008/07/01 07:20:52
87 [sshconnect.c]
88 Check ExitOnForwardFailure if forwardings are disabled due to a failed
89 host key check. ok djm@
f9b45eaf 90 - dtucker@cvs.openbsd.org 2008/07/01 07:24:22
91 [sshconnect.c sshd.c]
92 Send CR LF during protocol banner exchanges, but only for Protocol 2 only,
93 in order to comply with RFC 4253. bz #1443, ok djm@
5ebed98d 94 - stevesk@cvs.openbsd.org 2008/07/01 23:12:47
95 [PROTOCOL.agent]
96 fix some typos; ok djm@
39ceddb7 97 - djm@cvs.openbsd.org 2008/07/02 02:24:18
98 [sshd_config sshd_config.5 sshd.8 servconf.c]
99 increase default size of ssh protocol 1 ephemeral key from 768 to 1024
100 bits; prodded by & ok dtucker@ ok deraadt@
f7c2a004 101 - dtucker@cvs.openbsd.org 2008/07/02 12:03:51
102 [auth-rsa.c auth.c auth2-pubkey.c auth.h]
103 Merge duplicate host key file checks, based in part on a patch from Rob
104 Holland via bz #1348 . Also checks for non-regular files during protocol
105 1 RSA auth. ok djm@
221fc73c 106 - djm@cvs.openbsd.org 2008/07/02 12:36:39
107 [auth2-none.c auth2.c]
108 Make protocol 2 MaxAuthTries behaviour a little more sensible:
109 Check whether client has exceeded MaxAuthTries before running
110 an authentication method and skip it if they have, previously it
111 would always allow one try (for "none" auth).
112 Preincrement failure count before post-auth test - previously this
113 checked and postincremented, also to allow one "none" try.
114 Together, these two changes always count the "none" auth method
115 which could be skipped by a malicious client (e.g. an SSH worm)
116 to get an extra attempt at a real auth method. They also make
117 MaxAuthTries=0 a useful way to block users entirely (esp. in a
118 sshd_config Match block).
119 Also, move sending of any preauth banner from "none" auth method
120 to the first call to input_userauth_request(), so worms that skip
121 the "none" method get to see it too.
8f02e0be 122
00b7389d 12320080630
124 - (djm) OpenBSD CVS Sync
125 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
126 [regress/Makefile regress/key-options.sh]
127 Add regress test for key options. ok djm@
86d745dc 128 - dtucker@cvs.openbsd.org 2008/06/11 23:11:40
014f1b23 129 [regress/Makefile]
86d745dc 130 Don't run cipher-speed test by default; mistakenly enabled by me
014f1b23 131 - djm@cvs.openbsd.org 2008/06/28 13:57:25
132 [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh]
133 very basic regress test against Twisted Conch in "make interop"
134 target (conch is available in ports/devel/py-twisted/conch);
135 ok markus@
8476b024 136 - (djm) [regress/Makefile] search for conch by path, like we do putty
00b7389d 137
aa47edcc 13820080629
139 - (djm) OpenBSD CVS Sync
140 - martynas@cvs.openbsd.org 2008/06/21 07:46:46
141 [sftp.c]
142 use optopt to get invalid flag, instead of return value of getopt,
143 which is always '?'; ok djm@
ccf0fcb6 144 - otto@cvs.openbsd.org 2008/06/25 11:13:43
145 [key.c]
146 add key length to visual fingerprint; zap magical constants;
147 ok grunk@ djm@
681efe9f 148 - djm@cvs.openbsd.org 2008/06/26 06:10:09
149 [sftp-client.c sftp-server.c]
150 allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky
151 bits. Note that this only affects explicit setting of modes (e.g. via
152 sftp(1)'s chmod command) and not file transfers. (bz#1310)
153 ok deraadt@ at c2k8
b080d398 154 - djm@cvs.openbsd.org 2008/06/26 09:19:40
155 [dh.c dh.h moduli.c]
156 when loading moduli from /etc/moduli in sshd(8), check that they
157 are of the expected "safe prime" structure and have had
158 appropriate primality tests performed;
159 feedback and ok dtucker@
7b3999b8 160 - grunk@cvs.openbsd.org 2008/06/26 11:46:31
161 [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c]
162 Move SSH Fingerprint Visualization away from sharing the config option
163 CheckHostIP to an own config option named VisualHostKey.
164 While there, fix the behaviour that ssh would draw a random art picture
165 on every newly seen host even when the option was not enabled.
166 prodded by deraadt@, discussions,
167 help and ok markus@ djm@ dtucker@
2e8d3306 168 - jmc@cvs.openbsd.org 2008/06/26 21:11:46
169 [ssh.1]
170 add VisualHostKey to the list of options listed in -o;
cda43f66 171 - djm@cvs.openbsd.org 2008/06/28 07:25:07
172 [PROTOCOL]
173 spelling fixes
c525650a 174 - djm@cvs.openbsd.org 2008/06/28 13:58:23
175 [ssh-agent.c]
176 refuse to add a key that has unknown constraints specified;
177 ok markus
9ee2fb0e 178 - djm@cvs.openbsd.org 2008/06/28 14:05:15
179 [ssh-agent.c]
180 reset global compat flag after processing a protocol 2 signature
181 request with the legacy DSA encoding flag set; ok markus
ab3eb078 182 - djm@cvs.openbsd.org 2008/06/28 14:08:30
183 [PROTOCOL PROTOCOL.agent]
184 document the protocol used by ssh-agent; "looks ok" markus@
aa47edcc 185
f6351d4d 18620080628
187 - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]
188 RFC.nroff lacks a license, remove it (it is long gone in OpenBSD).
189
bd6b3feb 19020080626
191 - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
192 (bz#1372)
a32d8b38 193 - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
194 [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files.
bd6b3feb 195
b3784859 19620080616
197 - (dtucker) OpenBSD CVS Sync
198 - dtucker@cvs.openbsd.org 2008/06/16 13:22:53
199 [session.c channels.c]
200 Rename the isatty argument to is_tty so we don't shadow
201 isatty(3). ok markus@
245f4d36 202 - (dtucker) [channels.c] isatty -> is_tty here too.
b3784859 203
b55b0285 20420080615
205 - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc.
081573fe 206 - OpenBSD CVS Sync
207 - dtucker@cvs.openbsd.org 2008/06/14 15:49:48
208 [sshd.c]
209 wrap long line at 80 chars
26512357 210 - dtucker@cvs.openbsd.org 2008/06/14 17:07:11
211 [sshd.c]
212 ensure default umask disallows at least group and world write; ok djm@
2608aa2b 213 - djm@cvs.openbsd.org 2008/06/14 18:33:43
214 [session.c]
215 suppress the warning message from chdir(homedir) failures
216 when chrooted (bz#1461); ok dtucker
49c5f262 217 - dtucker@cvs.openbsd.org 2008/06/14 19:42:10
218 [scp.1]
219 Mention that scp follows symlinks during -r. bz #1466,
220 from nectar at apple
d97287d3 221 - dtucker@cvs.openbsd.org 2008/06/15 16:55:38
222 [sshd_config.5]
223 MaxSessions is allowed in a Match block too
8086aeb2 224 - dtucker@cvs.openbsd.org 2008/06/15 16:58:40
225 [servconf.c sshd_config.5]
226 Allow MaxAuthTries within a Match block. ok djm@
c9478090 227 - djm@cvs.openbsd.org 2008/06/15 20:06:26
228 [channels.c channels.h session.c]
229 don't call isatty() on a pty master, instead pass a flag down to
230 channel_set_fds() indicating that te fds refer to a tty. Fixes a
231 hang on exit on Solaris (bz#1463) in portable but is actually
232 a generic bug; ok dtucker deraadt markus
b55b0285 233
add357c6 23420080614
235 - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction
236 replacement code; patch from ighighi AT gmail.com in bz#1240;
237 ok dtucker
238
849d3ceb 23920080613
240 - (dtucker) OpenBSD CVS Sync
241 - deraadt@cvs.openbsd.org 2008/06/13 09:44:36
242 [packet.c]
243 compile on older gcc; no decl after code
52ad6b9a 244 - dtucker@cvs.openbsd.org 2008/06/13 13:56:59
245 [monitor.c]
246 Clear key options in the monitor on failed authentication, prevents
247 applying additional restrictions to non-pubkey authentications in
248 the case where pubkey fails but another method subsequently succeeds.
249 bz #1472, found by Colin Watson, ok markus@ djm@
1d0b7aaa 250 - dtucker@cvs.openbsd.org 2008/06/13 14:18:51
251 [auth2-pubkey.c auth-rhosts.c]
252 Include unistd.h for close(), prevents warnings in -portable
a3f13d60 253 - dtucker@cvs.openbsd.org 2008/06/13 17:21:20
254 [mux.c]
255 Friendlier error messages for mux fallback. ok djm@
a15e7da1 256 - dtucker@cvs.openbsd.org 2008/06/13 18:55:22
257 [scp.c]
258 Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@
990ada29 259 - grunk@cvs.openbsd.org 2008/06/13 20:13:26
260 [ssh.1]
261 Explain the use of SSH fpr visualization using random art, and cite the
262 original scientific paper inspiring that technique.
263 Much help with English and nroff by jmc@, thanks.
596a825b 264 - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which
265 despite its name doesn't seem to implement all of GSSAPI. Patch from
266 Jan Engelhardt, sanity checked by Simon Wilkinson.
849d3ceb 267
9754b94b 26820080612
269 - (dtucker) OpenBSD CVS Sync
270 - jmc@cvs.openbsd.org 2008/06/11 07:30:37
271 [sshd.8]
272 kill trailing whitespace;
aff73c5f 273 - grunk@cvs.openbsd.org 2008/06/11 21:01:35
274 [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
275 sshconnect.c]
276 Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
277 graphical hash visualization schemes known as "random art", and by
278 Dan Kaminsky's musings on the subject during a BlackOp talk at the
279 23C3 in Berlin.
280 Scientific publication (original paper):
281 "Hash Visualization: a New Technique to improve Real-World Security",
282 Perrig A. and Song D., 1999, International Workshop on Cryptographic
283 Techniques and E-Commerce (CrypTEC '99)
284 http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
285 The algorithm used here is a worm crawling over a discrete plane,
286 leaving a trace (augmenting the field) everywhere it goes.
287 Movement is taken from dgst_raw 2bit-wise. Bumping into walls
288 makes the respective movement vector be ignored for this turn,
289 thus switching to the other color of the chessboard.
290 Graphs are not unambiguous for now, because circles in graphs can be
291 walked in either direction.
292 discussions with several people,
293 help, corrections and ok markus@ djm@
93778882 294 - grunk@cvs.openbsd.org 2008/06/11 21:38:25
295 [ssh-keygen.c]
296 ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub
297 would not display you the random art as intended, spotted by canacar@
639211b7 298 - grunk@cvs.openbsd.org 2008/06/11 22:20:46
299 [ssh-keygen.c ssh-keygen.1]
300 ssh-keygen would write fingerprints to STDOUT, and random art to STDERR,
301 that is not how it was envisioned.
302 Also correct manpage saying that -v is needed along with -l for it to work.
303 spotted by naddy@
e3115002 304 - otto@cvs.openbsd.org 2008/06/11 23:02:22
305 [key.c]
306 simpler way of computing the augmentations; ok grunk@
fe88400f 307 - grunk@cvs.openbsd.org 2008/06/11 23:03:56
308 [ssh_config.5]
309 CheckHostIP set to ``fingerprint'' will display both hex and random art
310 spotted by naddy@
97841001 311 - grunk@cvs.openbsd.org 2008/06/11 23:51:57
312 [key.c]
313 #define statements that are not atoms need braces around them, else they
314 will cause trouble in some cases.
315 Also do a computation of -1 once, and not in a loop several times.
316 spotted by otto@
e907df41 317 - dtucker@cvs.openbsd.org 2008/06/12 00:03:49
318 [dns.c canohost.c sshconnect.c]
319 Do not pass "0" strings as ports to getaddrinfo because the lookups
320 can slow things down and we never use the service info anyway. bz
321 #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok
322 deraadt@ djm@
323 djm belives that the reason for the "0" strings is to ensure that
324 it's not possible to call getaddrinfo with both host and port being
325 NULL. In the case of canohost.c host is a local array. In the
326 case of sshconnect.c, it's checked for null immediately before use.
327 In dns.c it ultimately comes from ssh.c:main() and is guaranteed to
328 be non-null but it's not obvious, so I added a warning message in
329 case it is ever passed a null.
330 - grunk@cvs.openbsd.org 2008/06/12 00:13:55
331 [sshconnect.c]
332 Make ssh print the random art also when ssh'ing to a host using IP only.
333 spotted by naddy@, ok and help djm@ dtucker@
208cc0ee 334 - otto@cvs.openbsd.org 2008/06/12 00:13:13
335 [key.c]
336 use an odd number of rows and columns and a separate start marker, looks
337 better; ok grunk@
f17f705b 338 - djm@cvs.openbsd.org 2008/06/12 03:40:52
339 [clientloop.h mux.c channels.c clientloop.c channels.h]
340 Enable ~ escapes for multiplex slave sessions; give each channel
341 its own escape state and hook the escape filters up to muxed
342 channels. bz #1331
343 Mux slaves do not currently support the ~^Z and ~& escapes.
344 NB. this change cranks the mux protocol version, so a new ssh
345 mux client will not be able to connect to a running old ssh
346 mux master.
347 ok dtucker@
72becb62 348 - djm@cvs.openbsd.org 2008/06/12 04:06:00
349 [clientloop.h ssh.c clientloop.c]
350 maintain an ordered queue of outstanding global requests that we
351 expect replies to, similar to the per-channel confirmation queue.
352 Use this queue to verify success or failure for remote forward
353 establishment in a race free way.
354 ok dtucker@
344f1d3d 355 - djm@cvs.openbsd.org 2008/06/12 04:17:47
356 [clientloop.c]
357 thall shalt not code past the eightieth column
e8097dc9 358 - djm@cvs.openbsd.org 2008/06/12 04:24:06
359 [ssh.c]
360 thal shalt not code past the eightieth column
9bcf03ce 361 - djm@cvs.openbsd.org 2008/06/12 05:15:41
362 [PROTOCOL]
363 document tun@openssh.com forwarding method
aacab402 364 - djm@cvs.openbsd.org 2008/06/12 05:32:30
365 [mux.c]
366 some more TODO for me
2bb50d23 367 - grunk@cvs.openbsd.org 2008/06/12 05:42:46
368 [key.c]
369 supply the key type (rsa1, rsa, dsa) as a caption in the frame of the
370 random art. while there, stress the fact that the field base should at
371 least be 8 characters for the pictures to make sense.
372 comment and ok djm@
373 - grunk@cvs.openbsd.org 2008/06/12 06:32:59
374 [key.c]
375 We already mark the start of the worm, now also mark the end of the worm
376 in our random art drawings.
377 ok djm@
e74caf1e 378 - djm@cvs.openbsd.org 2008/06/12 15:19:17
379 [clientloop.h channels.h clientloop.c channels.c mux.c]
380 The multiplexing escape char handler commit last night introduced a
381 small memory leak per session; plug it.
e9d0b573 382 - dtucker@cvs.openbsd.org 2008/06/12 16:35:31
383 [ssh_config.5 ssh.c]
384 keyword expansion for localcommand. ok djm@
a64f8307 385 - jmc@cvs.openbsd.org 2008/06/12 19:10:09
386 [ssh_config.5 ssh-keygen.1]
387 tweak the ascii art text; ok grunk
bc2d97c8 388 - dtucker@cvs.openbsd.org 2008/06/12 20:38:28
389 [sshd.c sshconnect.c packet.h misc.c misc.h packet.c]
390 Make keepalive timeouts apply while waiting for a packet, particularly
391 during key renegotiation (bz #1363). With djm and Matt Day, ok djm@
ad39a852 392 - djm@cvs.openbsd.org 2008/06/12 20:47:04
393 [sftp-client.c]
394 print extension revisions for extensions that we understand
07d8d480 395 - djm@cvs.openbsd.org 2008/06/12 21:06:25
396 [clientloop.c]
397 I was coalescing expected global request confirmation replies at
398 the wrong end of the queue - fix; prompted by markus@
31de76cc 399 - grunk@cvs.openbsd.org 2008/06/12 21:14:46
400 [ssh-keygen.c]
401 make ssh-keygen -lf show the key type just as ssh-add -l would do it
402 ok djm@ markus@
f97fb6ca 403 - grunk@cvs.openbsd.org 2008/06/12 22:03:36
404 [key.c]
405 add my copyright, ok djm@
6d8216ff 406 - ian@cvs.openbsd.org 2008/06/12 23:24:58
407 [sshconnect.c]
408 tweak wording in message, ok deraadt@ jmc@
2c83cd01 409 - dtucker@cvs.openbsd.org 2008/06/13 00:12:02
410 [sftp.h log.h]
411 replace __dead with __attribute__((noreturn)), makes things
412 a little easier to port. Also, add it to sigdie(). ok djm@
b97ea6eb 413 - djm@cvs.openbsd.org 2008/06/13 00:16:49
414 [mux.c]
415 fall back to creating a new TCP connection on most multiplexing errors
416 (socket connect fail, invalid version, refused permittion, corrupted
417 messages, etc.); bz #1329 ok dtucker@
243cc316 418 - dtucker@cvs.openbsd.org 2008/06/13 00:47:53
419 [mux.c]
420 upcast size_t to u_long to match format arg; ok djm@
041f11dc 421 - dtucker@cvs.openbsd.org 2008/06/13 00:51:47
422 [mac.c]
423 upcast another size_t to u_long to match format
852eb76b 424 - dtucker@cvs.openbsd.org 2008/06/13 01:38:23
425 [misc.c]
426 upcast uid to long with matching %ld, prevents warnings in portable
632f2669 427 - djm@cvs.openbsd.org 2008/06/13 04:40:22
428 [auth2-pubkey.c auth-rhosts.c]
429 refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not
430 regular files; report from Solar Designer via Colin Watson in bz#1471
431 ok dtucker@ deraadt
136d0181 432 - (dtucker) [clientloop.c serverloop.c] channel_register_filter now
433 takes 2 more args. with djm@
49190c3d 434 - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch
435 from Todd Vierling.
02e605ed 436 - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA
437 systems. Patch from R. Scott Bailey.
c694c610 438 - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used
439 on big endian machines, so ifdef them for little-endian only to prevent
440 unused function warnings on big-endians.
56f77432 441 - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent
442 compiler warnings on some platforms. Based on a discussion with otto@
9754b94b 443
554ebbed 44420080611
445 - (djm) [channels.c configure.ac]
446 Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no)
447 bz#1464; ok dtucker
448
15b5fa9b 44920080610
450 - (dtucker) OpenBSD CVS Sync
451 - djm@cvs.openbsd.org 2008/06/10 03:57:27
452 [servconf.c match.h sshd_config.5]
453 support CIDR address matching in sshd_config "Match address" blocks, with
454 full support for negation and fall-back to classic wildcard matching.
455 For example:
456 Match address 192.0.2.0/24,3ffe:ffff::/32,!10.*
457 PasswordAuthentication yes
458 addrmatch.c code mostly lifted from flowd's addr.c
459 feedback and ok dtucker@
8b671558 460 - djm@cvs.openbsd.org 2008/06/10 04:17:46
461 [sshd_config.5]
462 better reference for pattern-list
1760c982 463 - dtucker@cvs.openbsd.org 2008/06/10 04:50:25
464 [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8]
465 Add extended test mode (-T) and connection parameters for test mode (-C).
466 -T causes sshd to write its effective configuration to stdout and exit.
467 -C causes any relevant Match rules to be applied before output. The
468 combination allows tesing of the parser and config files. ok deraadt djm
01e9e424 469 - jmc@cvs.openbsd.org 2008/06/10 07:12:00
470 [sshd_config.5]
471 tweak previous;
3b42e3ac 472 - jmc@cvs.openbsd.org 2008/06/10 08:17:40
473 [sshd.8 sshd.c]
474 - update usage()
475 - fix SYNOPSIS, and sort options
476 - some minor additional fixes
f0528444 477 - dtucker@cvs.openbsd.org 2008/06/09 18:06:32
478 [regress/test-exec.sh]
479 Don't generate putty keys if we're not going to use them. ok djm
16d46c30 480 - dtucker@cvs.openbsd.org 2008/06/10 05:23:32
481 [regress/addrmatch.sh regress/Makefile]
482 Regress test for Match CIDR rules. ok djm@
94edc013 483 - dtucker@cvs.openbsd.org 2008/06/10 15:21:41
484 [test-exec.sh]
485 Use a more portable construct for checking if we're running a putty test
64c576e9 486 - dtucker@cvs.openbsd.org 2008/06/10 15:28:49
487 [test-exec.sh]
488 Add quotes
f6748d7b 489 - dtucker@cvs.openbsd.org 2008/06/10 18:21:24
490 [ssh_config.5]
491 clarify that Host patterns are space-separated. ok deraadt
3f0444ca 492 - djm@cvs.openbsd.org 2008/06/10 22:15:23
493 [PROTOCOL ssh.c serverloop.c]
494 Add a no-more-sessions@openssh.com global request extension that the
495 client sends when it knows that it will never request another session
496 (i.e. when session multiplexing is disabled). This allows a server to
497 disallow further session requests and terminate the session.
498 Why would a non-multiplexing client ever issue additional session
499 requests? It could have been attacked with something like SSH'jack:
500 http://www.storm.net.nz/projects/7
501 feedback & ok markus
b3b048d6 502 - djm@cvs.openbsd.org 2008/06/10 23:06:19
503 [auth-options.c match.c servconf.c addrmatch.c sshd.8]
504 support CIDR address matching in .ssh/authorized_keys from="..." stanzas
505 ok and extensive testing dtucker@
8fb12ef0 506 - dtucker@cvs.openbsd.org 2008/06/10 23:21:34
507 [bufaux.c]
508 Use '\0' for a nul byte rather than unadorned 0. ok djm@
a6d05adf 509 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
510 [Makefile regress/key-options.sh]
511 Add regress test for key options. ok djm@
edee47f5 512 - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6
513 since the new CIDR code in addmatch.c references it.
514 - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6
515 specific tests on platforms that don't do IPv6.
8ac1d2eb 516 - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well
517 as environment.
0694c78f 518 - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now.
15b5fa9b 519
10e804f4 52020080609
521 - (dtucker) OpenBSD CVS Sync
522 - dtucker@cvs.openbsd.org 2008/06/08 17:04:41
523 [sftp-server.c]
524 Add case for ENOSYS in errno_to_portable; ok deraadt
5a3cde15 525 - dtucker@cvs.openbsd.org 2008/06/08 20:15:29
526 [sftp.c sftp-client.c sftp-client.h]
527 Have the sftp client store the statvfs replies in wire format,
528 which prevents problems when the server's native sizes exceed the
529 client's.
530 Also extends the sizes of the remaining 32bit wire format to 64bit,
531 they're specified as unsigned long in the standard.
7290afcb 532 - dtucker@cvs.openbsd.org 2008/06/09 13:02:39
2626070f 533 [sftp-server.c]
7290afcb 534 Extend 32bit -> 64bit values for statvfs extension missed in previous
535 commit.
2626070f 536 - dtucker@cvs.openbsd.org 2008/06/09 13:38:46
537 [PROTOCOL]
538 Use a $OpenBSD tag so our scripts will sync changes.
10e804f4 539
22f5e872 54020080608
541 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c
542 openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h
543 openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and
544 fstatvfs and remove #defines around statvfs code. ok djm@
7a4f468b 545 - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a
546 macro to convert fsid to unsigned long for platforms where fsid is a
547 2-member array.
22f5e872 548
0894bbed 54920080607
550 - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H.
4538e135 551 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c]
552 Do not enable statvfs extensions on platforms that do not have statvfs.
2abb1ef5 553 - (dtucker) OpenBSD CVS Sync
554 - djm@cvs.openbsd.org 2008/05/19 06:14:02
555 [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@
82bb6f20 556 - djm@cvs.openbsd.org 2008/05/19 15:45:07
557 [sshtty.c ttymodes.c sshpty.h]
558 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
559 we would send the modes corresponding to a zeroed struct termios,
560 whereas we should have been sending an empty list of modes.
561 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
048acbeb 562 - djm@cvs.openbsd.org 2008/05/19 15:46:31
563 [ssh-keygen.c]
564 support -l (print fingerprint) in combination with -F (find host) to
565 search for a host in ~/.ssh/known_hosts and display its fingerprint;
566 ok markus@
4651c790 567 - djm@cvs.openbsd.org 2008/05/19 20:53:52
568 [clientloop.c]
569 unbreak tree by committing this bit that I missed from:
570 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
571 we would send the modes corresponding to a zeroed struct termios,
572 whereas we should have been sending an empty list of modes.
573 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
0894bbed 574
07e61b8a 57520080604
576 - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias
577 in arc4random_uniform with upper_bound in (2^30,2*31). Note that
578 OpenSSH did not make requests with upper bounds in this range.
579
b3ef88dc 58020080519
581 - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in]
582 [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h]
583 Fix compilation on Linux, including pulling in fmt_scaled(3)
584 implementation from OpenBSD's libutil.
585
9b04dbaa 58620080518
587 - (djm) OpenBSD CVS Sync
588 - djm@cvs.openbsd.org 2008/04/04 05:14:38
589 [sshd_config.5]
590 ChrootDirectory is supported in Match blocks (in fact, it is most useful
591 there). Spotted by Minstrel AT minstrel.org.uk
5b76e3ef 592 - djm@cvs.openbsd.org 2008/04/04 06:44:26
593 [sshd_config.5]
594 oops, some unrelated stuff crept into that commit - backout.
595 spotted by jmc@
ade21243 596 - djm@cvs.openbsd.org 2008/04/05 02:46:02
597 [sshd_config.5]
598 HostbasedAuthentication is supported under Match too
185adaf8 599 - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c]
600 [configure.ac] Implement arc4random_buf(), import implementation of
601 arc4random_uniform() from OpenBSD
936e7c8c 602 - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes
c49ce62e 603 - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h
c1d152b8 604 - (djm) OpenBSD CVS Sync
605 - djm@cvs.openbsd.org 2008/04/13 00:22:17
606 [dh.c sshd.c]
607 Use arc4random_buf() when requesting more than a single word of output
608 Use arc4random_uniform() when the desired random number upper bound
609 is not a power of two
610 ok deraadt@ millert@
360b43ab 611 - djm@cvs.openbsd.org 2008/04/18 12:32:11
612 [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h]
613 introduce sftp extension methods statvfs@openssh.com and
614 fstatvfs@openssh.com that implement statvfs(2)-like operations,
615 based on a patch from miklos AT szeredi.hu (bz#1399)
616 also add a "df" command to the sftp client that uses the
617 statvfs@openssh.com to produce a df(1)-like display of filesystem
618 space and inode utilisation
619 ok markus@
ea530517 620 - jmc@cvs.openbsd.org 2008/04/18 17:15:47
621 [sftp.1]
622 macro fixage;
48fbfda0 623 - djm@cvs.openbsd.org 2008/04/18 22:01:33
624 [session.c]
625 remove unneccessary parentheses
0bb7755b 626 - otto@cvs.openbsd.org 2008/04/29 11:20:31
627 [monitor_mm.h]
628 garbage collect two unused fields in struct mm_master; ok markus@
c47ff7a6 629 - djm@cvs.openbsd.org 2008/04/30 10:14:03
630 [ssh-keyscan.1 ssh-keyscan.c]
631 default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by
632 larsnooden AT openoffice.org
43c3f85c 633 - pyr@cvs.openbsd.org 2008/05/07 05:49:37
634 [servconf.c servconf.h session.c sshd_config.5]
635 Enable the AllowAgentForwarding option in sshd_config (global and match
636 context), to specify if agents should be permitted on the server.
637 As the man page states:
638 ``Note that disabling Agent forwarding does not improve security
639 unless users are also denied shell access, as they can always install
640 their own forwarders.''
641 ok djm@, ok and a mild frown markus@
5c7e2b47 642 - pyr@cvs.openbsd.org 2008/05/07 06:43:35
643 [sshd_config]
644 push the sshd_config bits in, spotted by ajacoutot@
94569631 645 - jmc@cvs.openbsd.org 2008/05/07 08:00:14
646 [sshd_config.5]
647 sort;
17f02f0a 648 - markus@cvs.openbsd.org 2008/05/08 06:59:01
649 [bufaux.c buffer.h channels.c packet.c packet.h]
650 avoid extra malloc/copy/free when receiving data over the net;
651 ~10% speedup for localhost-scp; ok djm@
3593bdc0 652 - djm@cvs.openbsd.org 2008/05/08 12:02:23
653 [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c]
654 [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c]
655 [ssh.c sshd.c]
656 Implement a channel success/failure status confirmation callback
657 mechanism. Each channel maintains a queue of callbacks, which will
658 be drained in order (RFC4253 guarantees confirm messages are not
659 reordered within an channel).
660 Also includes a abandonment callback to clean up if a channel is
661 closed without sending confirmation messages. This probably
662 shouldn't happen in compliant implementations, but it could be
663 abused to leak memory.
664 ok markus@ (as part of a larger diff)
c6dca55e 665 - djm@cvs.openbsd.org 2008/05/08 12:21:16
666 [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c]
667 [sshd_config sshd_config.5]
668 Make the maximum number of sessions run-time controllable via
669 a sshd_config MaxSessions knob. This is useful for disabling
670 login/shell/subsystem access while leaving port-forwarding working
671 (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or
672 simply increasing the number of allows multiplexed sessions.
673 Because some bozos are sure to configure MaxSessions in excess of the
674 number of available file descriptors in sshd (which, at peak, might be
675 as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds
676 on error paths, and make it fail gracefully on out-of-fd conditions -
677 sending channel errors instead of than exiting with fatal().
678 bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com
679 ok markus@
95d3c124 680 - djm@cvs.openbsd.org 2008/05/08 13:06:11
681 [clientloop.c clientloop.h ssh.c]
682 Use new channel status confirmation callback system to properly deal
683 with "important" channel requests that fail, in particular command exec,
684 shell and subsystem requests. Previously we would optimistically assume
685 that the requests would always succeed, which could cause hangs if they
686 did not (e.g. when the server runs out of fds) or were unimplemented by
687 the server (bz #1384)
688 Also, properly report failing multiplex channel requests via the mux
689 client stderr (subject to LogLevel in the mux master) - better than
690 silently failing.
691 most bits ok markus@ (as part of a larger diff)
e07e21ad 692 - djm@cvs.openbsd.org 2008/05/09 04:55:56
693 [channels.c channels.h clientloop.c serverloop.c]
694 Try additional addresses when connecting to a port forward destination
695 whose DNS name resolves to more than one address. The previous behaviour
696 was to try the first address and give up.
697 Reported by stig AT venaas.com in bz#343
698 great feedback and ok markus@
3bcced4c 699 - djm@cvs.openbsd.org 2008/05/09 14:18:44
700 [clientloop.c clientloop.h ssh.c mux.c]
701 tidy up session multiplexing code, moving it into its own file and
702 making the function names more consistent - making ssh.c and
703 clientloop.c a fair bit more readable.
704 ok markus@
6cd3e678 705 - djm@cvs.openbsd.org 2008/05/09 14:26:08
706 [ssh.c]
707 dingo stole my diff hunk
ee7c3e92 708 - markus@cvs.openbsd.org 2008/05/09 16:16:06
709 [session.c]
710 re-add the USE_PIPES code and enable it.
711 without pipes shutdown-read from the sshd does not trigger
712 a SIGPIPE when the forked program does a write.
713 ok djm@
714 (Id sync only, USE_PIPES never left portable OpenSSH)
271f4a13 715 - markus@cvs.openbsd.org 2008/05/09 16:17:51
716 [channels.c]
717 error-fd race: don't enable the error fd in the select bitmask
718 for channels with both in- and output closed, since the channel
719 will go away before we call select();
720 report, lots of debugging help and ok djm@
50c96367 721 - markus@cvs.openbsd.org 2008/05/09 16:21:13
722 [channels.h clientloop.c nchan.c serverloop.c]
723 unbreak
724 ssh -2 localhost od /bin/ls | true
725 ignoring SIGPIPE by adding a new channel message (EOW) that signals
726 the peer that we're not interested in any data it might send.
727 fixes bz #85; discussion, debugging and ok djm@
d5820099 728 - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20
729 [umac.c]
730 Ensure nh_result lies on a 64-bit boundary (fixes warnings observed
731 on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
56b12440 732 - djm@cvs.openbsd.org 2008/05/15 23:52:24
733 [nchan2.ms]
734 document eow message in ssh protocol 2 channel state machine;
735 feedback and ok markus@
f8db3345 736 - djm@cvs.openbsd.org 2008/05/18 21:29:05
737 [sftp-server.c]
738 comment extension announcement
8be03682 739 - djm@cvs.openbsd.org 2008/05/16 08:30:42
740 [PROTOCOL]
741 document our protocol extensions and deviations; ok markus@
742 - djm@cvs.openbsd.org 2008/05/17 01:31:56
743 [PROTOCOL]
744 grammar and correctness fixes from stevesk@
9b04dbaa 745
490c3105 74620080403
747 - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile-
748 time warnings on LynxOS. Patch from ops AT iki.fi
1ebb73e4 749 - (djm) Force string arguments to replacement setproctitle() though
750 strnvis first. Ok dtucker@
490c3105 751
2b363e83 75220080403
753 - (djm) OpenBSD CVS sync:
754 - markus@cvs.openbsd.org 2008/04/02 15:36:51
755 [channels.c]
756 avoid possible hijacking of x11-forwarded connections (back out 1.183)
757 CVE-2008-1483; ok djm@
adb7acbc 758 - jmc@cvs.openbsd.org 2008/03/27 22:37:57
759 [sshd.8]
760 remove trailing whitespace;
53e0dc70 761 - djm@cvs.openbsd.org 2008/04/03 09:50:14
762 [version.h]
763 openssh-5.0
31b1b2c8 764 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
765 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
dd052df9 766 - (djm) [README] Update link to release notes
098ebea7 767 - (djm) Release 5.0p1
31b1b2c8 768
76920080315
770 - (djm) [regress/test-exec.sh] Quote putty-related variables in case they are
771 empty; report and patch from Peter Stuge
772 - (djm) [regress/test-exec.sh] Silence noise from detection of putty
773 commands; report from Peter Stuge
774 - (djm) [session.c] Relocate incorrectly-placed closefrom() that was causing
775 crashes when used with ChrootDirectory
776
2b363e83 777
0b639bf6 77820080327
779 - (dtucker) Cache selinux status earlier so we know if it's enabled after a
780 chroot. Allows ChrootDirectory to work with selinux support compiled in
781 but not enabled. Using it with selinux enabled will require some selinux
782 support inside the chroot. "looks sane" djm@
96110356 783 - (djm) Fix RCS ident in sftp-server-main.c
cea5c2ba 784 - (djm) OpenBSD CVS sync:
785 - jmc@cvs.openbsd.org 2008/02/11 07:58:28
786 [ssh.1 sshd.8 sshd_config.5]
787 bump Mdocdate for pages committed in "febuary", necessary because
788 of a typo in rcs.c;
d1978bb4 789 - deraadt@cvs.openbsd.org 2008/03/13 01:49:53
790 [monitor_fdpass.c]
791 Correct CMSG_SPACE and CMSG_LEN usage everywhere in the tree. Due to
792 an extensive discussion with otto, kettenis, millert, and hshoexer
93cdda57 793 - deraadt@cvs.openbsd.org 2008/03/15 16:19:02
794 [monitor_fdpass.c]
795 Repair the simple cases for msg_controllen where it should just be
796 CMSG_SIZE(sizeof(int)), not sizeof(buffer) which may be larger because
797 of alignment; ok kettenis hshoexer
530f04a8 798 - djm@cvs.openbsd.org 2008/03/23 12:54:01
799 [sftp-client.c]
800 prefer POSIX-style file renaming over filexfer rename behaviour if the
801 server supports the posix-rename@openssh.com extension.
802 Note that the old (filexfer) behaviour would refuse to clobber an
803 existing file. Users who depended on this should adjust their sftp(1)
804 usage.
805 ok deraadt@ markus@
cab36661 806 - deraadt@cvs.openbsd.org 2008/03/24 16:11:07
807 [monitor_fdpass.c]
808 msg_controllen has to be CMSG_SPACE so that the kernel can account for
809 each cmsg_len (ie. msg_controllen = sum of CMSG_ALIGN(cmsg_len). This
810 works now that kernel fd passing has been fixed to accept a bit of
811 sloppiness because of this ABI repair.
812 lots of discussion with kettenis
6e2a8e29 813 - djm@cvs.openbsd.org 2008/03/25 11:58:02
814 [session.c sshd_config.5]
815 ignore ~/.ssh/rc if a sshd_config ForceCommand is specified;
816 from dtucker@ ok deraadt@ djm@
0adb9449 817 - djm@cvs.openbsd.org 2008/03/25 23:01:41
818 [session.c]
819 last patch had backwards test; spotted by termim AT gmail.com
8c03e768 820 - djm@cvs.openbsd.org 2008/03/26 21:28:14
821 [auth-options.c auth-options.h session.c sshd.8]
822 add no-user-rc authorized_keys option to disable execution of ~/.ssh/rc
3b6ed4a3 823 - djm@cvs.openbsd.org 2008/03/27 00:16:49
824 [version.h]
825 openssh-4.9
f47fb977 826 - djm@cvs.openbsd.org 2008/03/24 21:46:54
827 [regress/sftp-badcmds.sh]
828 disable no-replace rename test now that we prefer a POSIX rename; spotted
829 by dkrause@
a0969097 830 - (djm) [configure.ac] fix alignment of --without-stackprotect description
bb23b54f 831 - (djm) [configure.ac] --with-selinux too
16510bb8 832 - (djm) [regress/Makefile] cleanup PuTTY interop test droppings
fc1c9fcf 833 - (djm) [README] Update link to release notes
1ca2f212 834 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
835 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
b667c771 836 - (djm) Release 4.9p1
0b639bf6 837
3e782ad1 83820080315
839 - (djm) [regress/test-exec.sh] Quote putty-related variables in case they are
840 empty; report and patch from Peter Stuge
841 - (djm) [regress/test-exec.sh] Silence noise from detection of putty
842 commands; report from Peter Stuge
fab9144d 843 - (djm) [session.c] Relocate incorrectly-placed closefrom() that was causing
844 crashes when used with ChrootDirectory
3e782ad1 845
caba7de7 84620080314
847 - (tim) [regress/sftp-cmds.sh] s/cd/lcd/ in lls test. Reported by
848 vinschen at redhat.com. Add () to put echo commands in subshell for lls test
849 I mistakenly left out of last commit.
9e8c6eb3 850 - (tim) [regress/localcommand.sh] Shell portability fix. Reported by imorgan at
851 nas.nasa.gov
caba7de7 852
49f32817 85320080313
854 - (djm) [Makefile.in regress/Makefile] Fix interop-tests target (note to
855 self: make changes to Makefile.in next time, not the generated Makefile).
32f129d1 856 - (djm) [Makefile.in regress/test-exec.sh] Find installed plink(1) and
857 puttygen(1) by $PATH
af8388bc 858 - (tim) [scp.c] Use poll.h if available, fall back to sys/poll.h if not. Patch
859 by vinschen at redhat.com.
575a5ece 860 - (tim) [regress/sftp-cmds.sh regress/ssh2putty.sh] Shell portability fixes
7e384d2c 861 from vinschen at redhat.com and imorgan at nas.nasa.gov
49f32817 862
86320080312
7fc75605 864 - (djm) OpenBSD CVS Sync
865 - dtucker@cvs.openbsd.org 2007/10/29 06:57:13
866 [regress/Makefile regress/localcommand.sh]
867 Add simple regress test for LocalCommand; ok djm@
a7c7196f 868 - jmc@cvs.openbsd.org 2007/11/25 15:35:09
869 [regress/agent-getpeereid.sh regress/agent.sh]
870 more existant -> existent, from Martynas Venckus;
871 pfctl changes: ok henning
872 ssh changes: ok deraadt
5e441c3c 873 - djm@cvs.openbsd.org 2007/12/12 05:04:03
874 [regress/sftp-cmds.sh]
875 unbreak lls command and add a regress test that would have caught the
876 breakage; spotted by mouring@
877 NB. sftp code change already committed.
f3dad773 878 - djm@cvs.openbsd.org 2007/12/21 04:13:53
879 [regress/Makefile regress/test-exec.sh regress/putty-ciphers.sh]
880 [regress/putty-kex.sh regress/putty-transfer.sh regress/ssh2putty.sh]
881 basic (crypto, kex and transfer) interop regression tests against putty
882 To run these, install putty and run "make interop-tests" from the build
883 directory - the tests aren't run by default yet.
7fc75605 884
ce433d53 88520080311
83fa7e8d 886 - (dtucker) [auth-pam.c monitor.c session.c sshd.c] Bug #926: Move
887 pam_open_session and pam_close_session into the privsep monitor, which
888 will ensure that pam_session_close is called as root. Patch from Tomas
889 Mraz.
890
caa21240 89120080309
892 - (dtucker) [configure.ac] It turns out gcc's -fstack-protector-all doesn't
893 always work for all platforms and versions, so test what we can and
894 add a configure flag to turn it of if needed. ok djm@
b2c70125 895 - (dtucker) [openbsd-compat/port-aix.{c,h}] Remove AIX specific initgroups
896 implementation. It's not needed to fix bug #1081 and breaks the build
897 on some AIX configurations.
3828f887 898 - (dtucker) [openbsd-compat/regress/strtonumtest.c] Bug #1347: Use platform's
899 equivalent of LLONG_MAX for the compat regression tests, which makes them
900 run on AIX and HP-UX. Patch from David Leonard.
23c5c479 901 - (dtucker) [configure.ac] Run stack-protector tests with -Werror to catch
902 platforms where gcc understands the option but it's not supported (and
903 thus generates a warning).
caa21240 904
c9e2b157 90520080307
906 - (djm) OpenBSD CVS Sync
907 - jmc@cvs.openbsd.org 2008/02/11 07:58:28
908 [ssh.1 sshd.8 sshd_config.5]
909 bump Mdocdate for pages committed in "febuary", necessary because
910 of a typo in rcs.c;
3dfce5de 911 - djm@cvs.openbsd.org 2008/02/13 22:38:17
912 [servconf.h session.c sshd.c]
913 rekey arc4random and OpenSSL RNG in postauth child
914 closefrom fds > 2 before shell/command execution
915 ok markus@
2600996b 916 - mbalmer@cvs.openbsd.org 2008/02/14 13:10:31
917 [sshd.c]
918 When started in configuration test mode (-t) do not check that sshd is
919 being started with an absolute path.
920 ok djm
e2875d9a 921 - markus@cvs.openbsd.org 2008/02/20 15:25:26
922 [session.c]
923 correct boolean encoding for coredump; der Mouse via dugsong
1d395ba0 924 - djm@cvs.openbsd.org 2008/02/22 05:58:56
925 [session.c]
926 closefrom() call was too early, delay it until just before we execute
927 the user's rc files (if any).
ac47b626 928 - dtucker@cvs.openbsd.org 2008/02/22 20:44:02
929 [clientloop.c packet.c packet.h serverloop.c]
930 Allow all SSH2 packet types, including UNIMPLEMENTED to reset the
931 keepalive timer (bz #1307). ok markus@
9fcc4e18 932 - djm@cvs.openbsd.org 2008/02/27 20:21:15
933 [sftp-server.c]
934 add an extension method "posix-rename@openssh.com" to perform POSIX atomic
935 rename() operations. based on patch from miklos AT szeredi.hu in bz#1400;
936 ok dtucker@ markus@
0c9a63f1 937 - deraadt@cvs.openbsd.org 2008/03/02 18:19:35
938 [monitor_fdpass.c]
939 use a union to ensure alignment of the cmsg (pay attention: various other
940 parts of the tree need this treatment too); ok djm
3673ea60 941 - deraadt@cvs.openbsd.org 2008/03/04 21:15:42
942 [version.h]
943 crank version; from djm
9fd799a4 944 - (tim) [regress/sftp-glob.sh] Shell portability fix.
c9e2b157 945
fbfeb0de 94620080302
947 - (dtucker) [configure.ac] FreeBSD's glob() doesn't behave the way we expect
948 either, so use our own.
949
6ce84f4f 95020080229
951 - (dtucker) [openbsd-compat/bsd-poll.c] We don't check for select(2) in
952 configure (and there's not much point, as openssh won't work without it)
953 so HAVE_SELECT is not defined and the poll(2) compat code doesn't get
954 built in. Remove HAVE_SELECT so we can build on platforms without poll.
55b82b39 955 - (dtucker) [scp.c] Include sys/poll.h inside HAVE_SYS_POLL_H.
29317db4 956 - (djm) [contrib/gnome-ssh-askpass2.h] Keep askpass windown on top. From
957 Debian patch via bernd AT openbsd.org
6ce84f4f 958
ebddd492 95920080228
960 - (dtucker) [configure.ac] Add -fstack-protector to LDFLAGS too, fixes
961 linking problems on AIX with gcc 4.1.x.
f5f25d17 962 - (dtucker) [includes.h ssh-add.c ssh-agent.c ssh-keygen.c ssh.c sshd.c
963 openbsd-compat/openssl-compat.{c,h}] Bug #1437 Move the OpenSSL compat
964 header to after OpenSSL headers, since some versions of OpenSSL have
965 SSLeay_add_all_algorithms as a macro already.
6e013118 966 - (dtucker) [key.c defines.h openbsd-compat/openssl-compat.h] Move old OpenSSL
967 compat glue into openssl-compat.h.
533a78f0 968 - (dtucker) [configure.ac openbsd-compat/port-aix.{c,h}] Bug #1081: Implement
969 getgrouplist via getgrset on AIX, rather than iterating over getgrent.
970 This allows, eg, Match and AllowGroups directives to work with NIS and
971 LDAP groups.
5c7fd4ce 972 - (dtucker) [sshd.c] Bug #1042: make log messages for tcpwrappers use the
973 same SyslogFacility as the rest of sshd. Patch from William Knox,
974 ok djm@.
ebddd492 975
2db5d1e9 97620080225
977 - (dtucker) [openbsd-compat/fake-rfc2553.h] rename ssh_gai_strerror hack
978 since it now conflicts with the helper function in misc.c. From
979 vinschen AT redhat.com.
a74e9b64 980 - (dtucker) [configure.ac audit-bsm.c] Bug #1420: Add a local implementation
981 of aug_get_machine for systems that don't have their own (eg OS X, FreeBSD).
982 Help and testing from csjp at FreeBSD org, vgiffin at apple com. ok djm@
3e35bb36 983 - (dtucker) [includes.h openbsd-compat/openssl-compat.c] Bug #1437: reshuffle
984 headers so ./configure --with-ssl-engine actually works. Patch from
985 Ian Lister.
2db5d1e9 986
880a060b 98720080224
988 - (tim) [contrib/cygwin/ssh-host-config]
989 Grammar changes on SYSCONFDIR LOCALSTATEDIR messages.
990 Check more thoroughly that it's possible to create the /var/empty directory.
991 Patch by vinschen AT redhat.com
992
737cce6f 99320080210
994 - OpenBSD CVS Sync
995 - chl@cvs.openbsd.org 2008/01/11 07:22:28
996 [sftp-client.c sftp-client.h]
997 disable unused functions
998 initially from tobias@, but disabled them by placing them in
999 "#ifdef notyet" which was asked by djm@
1000 ok djm@ tobias@
05841f5b 1001 - djm@cvs.openbsd.org 2008/01/19 19:13:28
1002 [ssh.1]
1003 satisfy the pedants: -q does not suppress all diagnostic messages (e.g.
1004 some commandline parsing warnings go unconditionally to stdout).
4d6760a7 1005 - djm@cvs.openbsd.org 2008/01/19 20:48:53
1006 [clientloop.c]
1007 fd leak on session multiplexing error path. Report and patch from
1008 gregory_shively AT fanniemae.com
7cd4e5bc 1009 - djm@cvs.openbsd.org 2008/01/19 20:51:26
1010 [ssh.c]
1011 ignore SIGPIPE in multiplex client mode - we can receive this if the
1012 server runs out of fds on us midway. Report and patch from
1013 gregory_shively AT fanniemae.com
1c861236 1014 - djm@cvs.openbsd.org 2008/01/19 22:04:57
1015 [sftp-client.c]
1016 fix remote handle leak in do_download() local file open error path;
1017 report and fix from sworley AT chkno.net
ccc6beea 1018 - djm@cvs.openbsd.org 2008/01/19 22:22:58
1019 [ssh-keygen.c]
1020 when hashing individual hosts (ssh-keygen -Hf hostname), make sure we
1021 hash just the specified hostname and not the entire hostspec from the
1022 keyfile. It may be of the form "hostname,ipaddr", which would lead to
1023 a hash that never matches. report and fix from jp AT devnull.cz
f8f89bae 1024 - djm@cvs.openbsd.org 2008/01/19 22:37:19
1025 [ssh-keygen.c]
1026 unbreak line numbering (broken in revision 1.164), fix error message
bc4cc956 1027 - djm@cvs.openbsd.org 2008/01/19 23:02:40
1028 [channels.c]
1029 When we added support for specified bind addresses for port forwards, we
1030 added a quirk SSH_OLD_FORWARD_ADDR. There is a bug in our handling of
1031 this for -L port forwards that causes the client to listen on both v4
1032 and v6 addresses when connected to a server with this quirk, despite
1033 having set 0.0.0.0 as a bind_address.
1034 report and patch from Jan.Pechanec AT Sun.COM; ok dtucker@
fe771396 1035 - djm@cvs.openbsd.org 2008/01/19 23:09:49
1036 [readconf.c readconf.h sshconnect2.c]
1037 promote rekeylimit to a int64 so it can hold the maximum useful limit
1038 of 2^32; report and patch from Jan.Pechanec AT Sun.COM, ok dtucker@
70755b3b 1039 - djm@cvs.openbsd.org 2008/01/20 00:38:30
1040 [sftp.c]
1041 When uploading, correctly handle the case of an unquoted filename with
1042 glob metacharacters that match a file exactly but not as a glob, e.g. a
1043 file called "[abcd]". report and test cases from duncan2nd AT gmx.de
b4bbe43c 1044 - djm@cvs.openbsd.org 2008/01/21 17:24:30
1045 [sftp-server.c]
1046 Remove the fixed 100 handle limit in sftp-server and allocate as many
1047 as we have available file descriptors. Patch from miklos AT szeredi.hu;
1048 ok dtucker@ markus@
514a858e 1049 - djm@cvs.openbsd.org 2008/01/21 19:20:17
1050 [sftp-client.c]
1051 when a remote write error occurs during an upload, ensure that ACKs for
1052 all issued requests are properly drained. patch from t8m AT centrum.cz
aacfb17b 1053 - dtucker@cvs.openbsd.org 2008/01/23 01:56:54
1054 [clientloop.c packet.c serverloop.c]
1055 Revert the change for bz #1307 as it causes connection aborts if an IGNORE
1056 packet arrives while we're waiting in packet_read_expect (and possibly
1057 elsewhere).
51402e76 1058 - jmc@cvs.openbsd.org 2008/01/31 20:06:50
1059 [scp.1]
1060 explain how to handle local file names containing colons;
1061 requested by Tamas TEVESZ
1062 ok dtucker
c33ba17e 1063 - markus@cvs.openbsd.org 2008/02/04 21:53:00
1064 [session.c sftp-server.c sftp.h]
1065 link sftp-server into sshd; feedback and ok djm@
7c36e880 1066 - mcbride@cvs.openbsd.org 2008/02/09 12:15:43
1067 [ssh.1 sshd.8]
1068 Document the correct permissions for the ~/.ssh/ directory.
1069 ok jmc
2bd88d9f 1070 - djm@cvs.openbsd.org 2008/02/10 09:55:37
1071 [sshd_config.5]
1072 mantion that "internal-sftp" is useful with ForceCommand too
c5bf32e6 1073 - djm@cvs.openbsd.org 2008/02/10 10:54:29
1074 [servconf.c session.c]
1075 delay ~ expansion for ChrootDirectory so it expands to the logged-in user's
1076 home, rather than the user who starts sshd (probably root)
737cce6f 1077
efcc134b 107820080119
1079 - (djm) Silence noice from expr in ssh-copy-id; patch from
1080 mikel AT mikelward.com
8eff0d0a 1081 - (djm) Only listen for IPv6 connections on AF_INET6 sockets; patch from
1082 tsr2600 AT gmail.com
efcc134b 1083
bd326285 108420080102
1085 - (dtucker) [configure.ac] Fix message for -fstack-protector-all test.
1086
2a72bc03 108720080101
1088 - (dtucker) OpenBSD CVS Sync
1089 - dtucker@cvs.openbsd.org 2007/12/31 10:41:31
1090 [readconf.c servconf.c]
1091 Prevent strict-aliasing warnings on newer gcc versions. bz #1355, patch
1092 from Dmitry V. Levin, ok djm@
59d68bae 1093 - dtucker@cvs.openbsd.org 2007/12/31 15:27:04
1094 [sshd.c]
1095 When in inetd mode, have sshd generate a Protocol 1 ephemeral server
1096 key only for connections where the client chooses Protocol 1 as opposed
1097 to when it's enabled in the server's config. Speeds up Protocol 2
1098 connections to inetd-mode servers that also allow Protocol 1. bz #440,
1099 based on a patch from bruno at wolff.to, ok markus@
e5088d08 1100 - dtucker@cvs.openbsd.org 2008/01/01 08:47:04
1101 [misc.c]
1102 spaces -> tabs from my previous commit
1103 - dtucker@cvs.openbsd.org 2008/01/01 09:06:39
1104 [scp.c]
1105 If scp -p encounters a pre-epoch timestamp, use the epoch which is
1106 as close as we can get given that it's used unsigned. Add a little
1107 debugging while there. bz #828, ok djm@
2ef741a3 1108 - dtucker@cvs.openbsd.org 2008/01/01 09:27:33
1109 [sshd_config.5 servconf.c]
1110 Allow PermitRootLogin in a Match block. Allows for, eg, permitting root
1111 only from the local network. ok markus@, man page bit ok jmc@
c9babd71 1112 - dtucker@cvs.openbsd.org 2008/01/01 08:51:20
1113 [moduli]
1114 Updated moduli file; ok djm@
2a72bc03 1115
a8ad3b9d 111620071231
1117 - (dtucker) [configure.ac openbsd-compat/glob.{c,h}] Bug #1407: force use of
1118 builtin glob implementation on Mac OS X. Based on a patch from
1119 vgiffin at apple.
1120
65172fff 112120071229
1122 - (dtucker) OpenBSD CVS Sync
1123 - djm@cvs.openbsd.org 2007/12/12 05:04:03
1124 [sftp.c]
1125 unbreak lls command and add a regress test that would have caught the
1126 breakage; spotted by mouring@
bb4626fe 1127 - dtucker@cvs.openbsd.org 2007/12/27 14:22:08
1128 [servconf.c canohost.c misc.c channels.c sshconnect.c misc.h ssh-keyscan.c
1129 sshd.c]
1130 Add a small helper function to consistently handle the EAI_SYSTEM error
1131 code of getaddrinfo. Prompted by vgiffin at apple com via bz #1417.
1132 ok markus@ stevesk@
271db2da 1133 - dtucker@cvs.openbsd.org 2007/12/28 15:32:24
1134 [clientloop.c serverloop.c packet.c]
1135 Make SSH2_MSG_UNIMPLEMENTED and SSH2_MSG_IGNORE messages reset the
1136 ServerAlive and ClientAlive timers. Prevents dropping a connection
1137 when these are enabled but the peer does not support our keepalives.
1138 bz #1307, ok djm@.
016f1482 1139 - dtucker@cvs.openbsd.org 2007/12/28 22:34:47
1140 [clientloop.c]
1141 Use the correct packet maximum sizes for remote port and agent forwarding.
1142 Prevents the server from killing the connection if too much data is queued
1143 and an excessively large packet gets sent. bz #1360, ok djm@.
65172fff 1144
eb5a7224 114520071202
1146 - (dtucker) [configure.ac] Enable -fstack-protector-all on systems where
1147 gcc supports it. ok djm@
4b565fda 1148 - (dtucker) [scp.c] Update $OpenBSD tag missing from rev 1.175 and remove
1149 leftover debug code.
ecb431c1 1150 - (dtucker) OpenBSD CVS Sync
1151 - dtucker@cvs.openbsd.org 2007/10/29 00:52:45
1152 [auth2-gss.c]
1153 Allow build without -DGSSAPI; ok deraadt@
1154 (Id sync only, Portable already has the ifdefs)
d0420e01 1155 - dtucker@cvs.openbsd.org 2007/10/29 01:55:04
1156 [ssh.c]
1157 Plug tiny mem leaks in ControlPath and ProxyCommand option processing;
1158 ok djm@
dc0cae51 1159 - dtucker@cvs.openbsd.org 2007/10/29 04:08:08
1160 [monitor_wrap.c monitor.c]
1161 Send config block back to slave for invalid users too so options
1162 set by a Match block (eg Banner) behave the same for non-existent
1163 users. Found by and ok djm@
d349e4bd 1164 - dtucker@cvs.openbsd.org 2007/10/29 06:51:59
1165 [ssh_config.5]
1166 ProxyCommand and LocalCommand use the user's shell, not /bin/sh; ok djm@
c80e7e5d 1167 - dtucker@cvs.openbsd.org 2007/10/29 06:54:50
1168 [ssh.c]
1169 Make LocalCommand work for Protocol 1 too; ok djm@
eb86ca9d 1170 - jmc@cvs.openbsd.org 2007/10/29 07:48:19
1171 [ssh_config.5]
1172 clean up after previous macro removal;
16912319 1173 - djm@cvs.openbsd.org 2007/11/03 00:36:14
1174 [clientloop.c]
1175 fix memory leak in process_cmdline(), patch from Jan.Pechanec AT Sun.COM;
1176 ok dtucker@
a7082e17 1177 - deraadt@cvs.openbsd.org 2007/11/03 01:24:06
1178 [ssh.c]
1179 bz #1377: getpwuid results were being clobbered by another getpw* call
1180 inside tilde_expand_filename(); save the data we need carefully
1181 ok djm
42f4b33f 1182 - dtucker@cvs.openbsd.org 2007/11/03 02:00:32
1183 [ssh.c]
1184 Use xstrdup/xfree when saving pwname and pwdir; ok deraadt@
f622d144 1185 - deraadt@cvs.openbsd.org 2007/11/03 02:03:49
1186 [ssh.c]
1187 avoid errno trashing in signal handler; ok dtucker
eb5a7224 1188
d884586a 118920071030
1190 - (djm) OpenBSD CVS Sync
1191 - djm@cvs.openbsd.org 2007/10/29 23:49:41
1192 [openbsd-compat/sys-tree.h]
1193 remove extra backslash at the end of RB_PROTOTYPE, report from
1194 Jan.Pechanec AT Sun.COM; ok deraadt@
1195
73209290 119620071026
1197 - (djm) OpenBSD CVS Sync
1198 - stevesk@cvs.openbsd.org 2007/09/11 23:49:09
1199 [sshpty.c]
1200 remove #if defined block not needed; ok markus@ dtucker@
1201 (NB. RCD ID sync only for portable)
530c2ec0 1202 - djm@cvs.openbsd.org 2007/09/21 03:05:23
1203 [ssh_config.5]
1204 document KbdInteractiveAuthentication in ssh_config.5;
1205 patch from dkg AT fifthhorseman.net
a3d3770c 1206 - djm@cvs.openbsd.org 2007/09/21 08:15:29
1207 [auth-bsdauth.c auth-passwd.c auth.c auth.h auth1.c auth2-chall.c]
1208 [monitor.c monitor_wrap.c]
1209 unifdef -DBSD_AUTH
1210 unifdef -USKEY
1211 These options have been in use for some years;
1212 ok markus@ "no objection" millert@
1213 (NB. RCD ID sync only for portable)
18660b86 1214 - canacar@cvs.openbsd.org 2007/09/25 23:48:57
1215 [ssh-agent.c]
1216 When adding a key that already exists, update the properties
1217 (time, confirm, comment) instead of discarding them. ok djm@ markus@
5e4fce9c 1218 - ray@cvs.openbsd.org 2007/09/27 00:15:57
1219 [dh.c]
1220 Don't return -1 on error in dh_pub_is_valid(), since it evaluates
1221 to true.
1222 Also fix a typo.
1223 Initial diff from Matthew Dempsky, input from djm.
1224 OK djm, markus.
e05f182e 1225 - dtucker@cvs.openbsd.org 2007/09/29 00:25:51
1226 [auth2.c]
1227 Remove unused prototype. ok djm@
3e2d9453 1228 - chl@cvs.openbsd.org 2007/10/02 17:49:58
1229 [ssh-keygen.c]
1230 handles zero-sized strings that fgets can return
c5b78b8e 1231 properly removes trailing newline
1232 removes an unused variable
1233 correctly counts line number
1234 "looks ok" ray@ markus@
c462cd6f 1235 - markus@cvs.openbsd.org 2007/10/22 19:10:24
1236 [readconf.c]
1237 make sure that both the local and remote port are correct when
1238 parsing -L; Jan Pechanec (bz #1378)
a733c71c 1239 - djm@cvs.openbsd.org 2007/10/24 03:30:02
1240 [sftp.c]
1241 rework argument splitting and parsing to cope correctly with common
1242 shell escapes and make handling of escaped characters consistent
1243 with sh(1) and between sftp commands (especially between ones that
1244 glob their arguments and ones that don't).
1245 parse command flags using getopt(3) rather than hand-rolled parsers.
1246 ok dtucker@
99b49072 1247 - djm@cvs.openbsd.org 2007/10/24 03:44:02
1248 [scp.c]
1249 factor out network read/write into an atomicio()-like function, and
1250 use it to handle short reads, apply bandwidth limits and update
1251 counters. make network IO non-blocking, so a small trickle of
1252 reads/writes has a chance of updating the progress meter; bz #799
1253 ok dtucker@
49e0d774 1254 - djm@cvs.openbsd.org 2006/08/29 09:44:00
1255 [regress/sftp-cmds.sh]
1256 clean up our mess
04ebbaad 1257 - markus@cvs.openbsd.org 2006/11/06 09:27:43
1258 [regress/cfgmatch.sh]
1259 fix quoting for non-(c)sh login shells.
1c158420 1260 - dtucker@cvs.openbsd.org 2006/12/13 08:36:36
1261 [regress/cfgmatch.sh]
1262 Additional test for multiple PermitOpen entries. ok djm@
ac01e61a 1263 - pvalchev@cvs.openbsd.org 2007/06/07 19:41:46
1264 [regress/cipher-speed.sh regress/try-ciphers.sh]
1265 test umac-64@openssh.com
1266 ok djm@
ba59fd15 1267 - djm@cvs.openbsd.org 2007/10/24 03:32:35
1268 [regress/sftp-cmds.sh regress/sftp-glob.sh regress/test-exec.sh]
1269 comprehensive tests for sftp escaping its interaction with globbing;
1270 ok dtucker@
2432048a 1271 - djm@cvs.openbsd.org 2007/10/26 05:30:01
1272 [regress/sftp-glob.sh regress/test-exec.sh]
1273 remove "echo -E" crap that I added in last commit and use printf(1) for
1274 cases where we strictly require echo not to reprocess escape characters.
9e8278d2 1275 - deraadt@cvs.openbsd.org 2005/11/28 17:50:12
1276 [openbsd-compat/glob.c]
1277 unused arg in internal static API
0af8cee7 1278 - jakob@cvs.openbsd.org 2007/10/11 18:36:41
d6f5019c 1279 [openbsd-compat/getrrsetbyname.c openbsd-compat/getrrsetbyname.h]
0af8cee7 1280 use RRSIG instead of SIG for DNSSEC. ok djm@
a9733dc0 1281 - otto@cvs.openbsd.org 2006/10/21 09:55:03
1282 [openbsd-compat/base64.c]
1283 remove calls to abort(3) that can't happen anyway; from
1284 <bret dot lambert at gmail.com>; ok millert@ deraadt@
49f7b80f 1285 - frantzen@cvs.openbsd.org 2004/04/24 18:11:46
1286 [openbsd-compat/sys-tree.h]
4987209d 1287 sync to Niels Provos' version. avoid unused variable warning in
1288 RB_NEXT()
49f7b80f 1289 - tdeval@cvs.openbsd.org 2004/11/24 18:10:42
1290 [openbsd-compat/sys-tree.h]
1291 typo
e271997a 1292 - grange@cvs.openbsd.org 2004/05/04 16:59:32
1293 [openbsd-compat/sys-queue.h]
1294 Remove useless ``elm'' argument from the SIMPLEQ_REMOVE_HEAD macro.
1295 This matches our SLIST behaviour and NetBSD's SIMPLEQ as well.
1296 ok millert krw deraadt
d0f02ff0 1297 - deraadt@cvs.openbsd.org 2005/02/25 13:29:30
1298 [openbsd-compat/sys-queue.h]
1299 minor white spacing
2d67e48d 1300 - otto@cvs.openbsd.org 2005/10/17 20:19:42
1301 [openbsd-compat/sys-queue.h]
1302 Performing certain operations on queue.h data structurs produced
1303 funny results. An example is calling LIST_REMOVE on the same
1304 element twice. This will not fail, but result in a data structure
1305 referencing who knows what. Prevent these accidents by NULLing some
1306 fields on remove and replace. This way, either a panic or segfault
1307 will be produced on the faulty operation.
95760c2a 1308 - otto@cvs.openbsd.org 2005/10/24 20:25:14
1309 [openbsd-compat/sys-queue.h]
1310 Partly backout. NOLIST, used in LISTs is probably interfering.
1311 requested by deraadt@
5fda41d4 1312 - otto@cvs.openbsd.org 2005/10/25 06:37:47
1313 [openbsd-compat/sys-queue.h]
1314 Some uvm problem is being exposed with the more strict macros.
1315 Revert until we've found out what's causing the panics.
c7215802 1316 - otto@cvs.openbsd.org 2005/11/25 08:06:25
1317 [openbsd-compat/sys-queue.h]
1318 Introduce debugging aid for queue macros. Disabled by default; but
1319 developers are encouraged to run with this enabled.
1320 ok krw@ fgsch@ deraadt@
9a35f8ed 1321 - otto@cvs.openbsd.org 2007/04/30 18:42:34
1322 [openbsd-compat/sys-queue.h]
1323 Enable QUEUE_MACRO_DEBUG on DIAGNOSTIC kernels.
1324 Input and okays from krw@, millert@, otto@, deraadt@, miod@.
5f762762 1325 - millert@cvs.openbsd.org 2004/10/07 16:56:11
1326 GLOB_NOESCAPE is POSIX so move it out of the #ifndef _POSIX_SOURCE
1327 block.
1328 (NB. mostly an RCS ID sync, as portable strips out the conditionals)
a556beb5 1329 - (djm) [regress/sftp-cmds.sh]
1330 Use more restrictive glob to pick up test files from /bin - some platforms
1331 ship broken symlinks there which could spoil the test.
882d4fb0 1332 - (djm) [openbsd-compat/bindresvport.c]
1333 Sync RCS ID after irrelevant (for portable OpenSSH) header shuffling
530c2ec0 1334
8aa5db7d 133520070927
1336 - (dtucker) [configure.ac atomicio.c] Fall back to including <sys/poll.h> if
1337 we don't have <poll.h> (eq QNX). From bacon at cs nyu edu.
86996ebe 1338 - (dtucker) [configure.ac defines.h] Shadow expiry does not work on QNX6
1339 so disable it for that platform. From bacon at cs nyu edu.
8aa5db7d 1340
9e994eff 134120070921
1342 - (djm) [atomicio.c] Fix spin avoidance for platforms that define
1343 EWOULDBLOCK; patch from ben AT psc.edu
1344
590c0dda 134520070917
1346 - (djm) OpenBSD CVS Sync
1347 - djm@cvs.openbsd.org 2007/08/23 02:49:43
1348 [auth-passwd.c auth.c session.c]
1349 unifdef HAVE_LOGIN_CAP; ok deraadt@ millert@
1350 NB. RCS ID sync only for portable
466143fd 1351 - djm@cvs.openbsd.org 2007/08/23 02:55:51
1352 [auth-passwd.c auth.c session.c]
1353 missed include bits from last commit
1354 NB. RCS ID sync only for portable
2aa63b7b 1355 - djm@cvs.openbsd.org 2007/08/23 03:06:10
1356 [auth.h]
1357 login_cap.h doesn't belong here
1358 NB. RCS ID sync only for portable
ba8cfba6 1359 - djm@cvs.openbsd.org 2007/08/23 03:22:16
1360 [auth2-none.c sshd_config sshd_config.5]
1361 Support "Banner=none" to disable displaying of the pre-login banner;
1362 ok dtucker@ deraadt@
3af8ef1e 1363 - djm@cvs.openbsd.org 2007/08/23 03:23:26
1364 [sshconnect.c]
1365 Execute ProxyCommands with $SHELL rather than /bin/sh unconditionally
8de7aaab 1366 - djm@cvs.openbsd.org 2007/09/04 03:21:03
1367 [clientloop.c monitor.c monitor_fdpass.c monitor_fdpass.h]
1368 [monitor_wrap.c ssh.c]
1369 make file descriptor passing code return an error rather than call fatal()
1370 when it encounters problems, and use this to make session multiplexing
1371 masters survive slaves failing to pass all stdio FDs; ok markus@
71300a43 1372 - djm@cvs.openbsd.org 2007/09/04 11:15:56
1373 [ssh.c sshconnect.c sshconnect.h]
1374 make ssh(1)'s ConnectTimeout option apply to both the TCP connection and
1375 SSH banner exchange (previously it just covered the TCP connection).
1376 This allows callers of ssh(1) to better detect and deal with stuck servers
1377 that accept a TCP connection but don't progress the protocol, and also
1378 makes ConnectTimeout useful for connections via a ProxyCommand;
1379 feedback and "looks ok" markus@
269cfc8a 1380 - sobrado@cvs.openbsd.org 2007/09/09 11:38:01
1381 [ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.c]
1382 sort synopsis and options in ssh-agent(1); usage is lowercase
1383 ok jmc@
39fa9566 1384 - stevesk@cvs.openbsd.org 2007/09/11 04:36:29
1385 [sshpty.c]
1386 sort #include
1387 NB. RCS ID sync only
b05117ac 1388 - gilles@cvs.openbsd.org 2007/09/11 15:47:17
1389 [session.c ssh-keygen.c sshlogin.c]
1390 use strcspn to properly overwrite '\n' in fgets returned buffer
1391 ok pyr@, ray@, millert@, moritz@, chl@
f119adf5 1392 - stevesk@cvs.openbsd.org 2007/09/11 23:49:09
1393 [sshpty.c]
1394 remove #if defined block not needed; ok markus@ dtucker@
1395 NB. RCS ID sync only
7cfacf5e 1396 - stevesk@cvs.openbsd.org 2007/09/12 19:39:19
1397 [umac.c]
1398 use xmalloc() and xfree(); ok markus@ pvalchev@
f8f7ecf5 1399 - djm@cvs.openbsd.org 2007/09/13 04:39:04
1400 [sftp-server.c]
1401 fix incorrect test when setting syslog facility; from Jan Pechanec
9e7f4c4f 1402 - djm@cvs.openbsd.org 2007/09/16 00:55:52
1403 [sftp-client.c]
1404 use off_t instead of u_int64_t for file offsets, matching what the
1405 progressmeter code expects; bz #842
7bf7b86c 1406 - (tim) [defines.h] Fix regression in long password support on OpenServer 6.
1407 Problem report and additional testing rac AT tenzing.org.
590c0dda 1408
e5fe7821 140920070914
1410 - (dtucker) [openbsd-compat/bsd-asprintf.c] Plug mem leak in error path.
1411 Patch from Jan.Pechanec at sun com.
1412
822e80ce 141320070910
1414 - (dtucker) [openbsd-compat/regress/closefromtest.c] Bug #1358: Always
1415 return 0 on successful test. From David.Leonard at quest com.
d837615a 1416 - (tim) [configure.ac] Autoconf didn't define HAVE_LIBIAF because we
1417 did a AC_CHECK_FUNCS within the AC_CHECK_LIB test.
822e80ce 1418
145707ab 141920070817
1420 - (dtucker) [sshd.8] Many Linux variants use a single "!" to denote locked
1421 accounts and that's what the code looks for, so make man page and code
1422 agree. Pointed out by Roumen Petrov.
85eed7c2 1423 - (dtucker) [INSTALL] Group the parts describing random options and PAM
1424 implementations together which is hopefully more coherent.
3d1d89ea 1425 - (dtucker) [INSTALL] the pid file is sshd.pid not ssh.pid.
49f63a45 1426 - (dtucker) [INSTALL] Give PAM its own heading.
3c4db087 1427 - (dtucker) [INSTALL] Link to tcpwrappers.
145707ab 1428
8d5728b7 142920070816
1430 - (dtucker) [session.c] Call PAM cleanup functions for unauthenticated
1431 connections too. Based on a patch from Sandro Wefel, with & ok djm@
1432
ed64eeca 143320070815
1434 - (dtucker) OpenBSD CVS Sync
1435 - markus@cvs.openbsd.org 2007/08/15 08:14:46
1436 [clientloop.c]
1437 do NOT fall back to the trused x11 cookie if generation of an untrusted
9c36d7f7 1438 cookie fails; from Jan Pechanec, via security-alert at sun.com;
1439 ok dtucker
3f921d0e 1440 - markus@cvs.openbsd.org 2007/08/15 08:16:49
1441 [version.h]
1442 openssh 4.7
1ce8114b 1443 - stevesk@cvs.openbsd.org 2007/08/15 12:13:41
1444 [ssh_config.5]
1445 tun device forwarding now honours ExitOnForwardFailure; ok markus@
06d20497 1446 - (dtucker) [openbsd-compat/bsd-cray.c] Remove debug from signal handler.
1447 ok djm@
4671cc21 1448 - (dtucker) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec
1449 contrib/suse/openssh.spec] Crank version.
ed64eeca 1450
265edd5e 145120070813
1452 - (dtucker) [session.c] Bug #1339: ensure that pam_setcred() is always
1453 called with PAM_ESTABLISH_CRED at least once, which resolves a problem
1454 with pam_dhkeys. Patch from David Leonard, ok djm@
1455
6b3e6430 145620070810
1457 - (dtucker) [auth-pam.c] Use sigdie here too. ok djm@
575ee4c4 1458 - (dtucker) [configure.ac] Bug #1343: Set DISABLE_FD_PASSING for QNX6. From
1459 Matt Kraai, ok djm@
6b3e6430 1460
86c718e3 146120070809
1462 - (dtucker) [openbsd-compat/port-aix.c] Comment typo.
549d7c4d 1463 - (dtucker) [README.platform] Document the interaction between PermitRootLogin
1464 and the AIX native login restrictions.
929a784c 1465 - (dtucker) [defines.h] Remove _PATH_{CSHELL,SHELLS} which aren't
1466 used anywhere and are a potential source of warnings.
86c718e3 1467
1b73b60e 146820070808
1469 - (djm) OpenBSD CVS Sync
1470 - ray@cvs.openbsd.org 2007/07/12 05:48:05
1471 [key.c]
1472 Delint: remove some unreachable statements, from Bret Lambert.
1473 OK markus@ and dtucker@.
d0ac0d65 1474 - sobrado@cvs.openbsd.org 2007/08/06 19:16:06
1475 [scp.1 scp.c]
1476 the ellipsis is not an optional argument; while here, sync the usage
1477 and synopsis of commands
1478 lots of good ideas by jmc@
1479 ok jmc@
79303c5a 1480 - djm@cvs.openbsd.org 2007/08/07 07:32:53
1481 [clientloop.c clientloop.h ssh.c]
1482 bz#1232: ensure that any specified LocalCommand is executed after the
1483 tunnel device is opened. Also, make failures to open a tunnel device
1484 fatal when ExitOnForwardFailure is active.
1485 Reported by h.goebel AT goebel-consult.de; ok dtucker markus reyk deraadt
1b73b60e 1486
af12bf9c 148720070724
1488 - (tim) [openssh.xml.in] make FMRI match what package scripts use.
87f560bb 1489 - (tim) [openbsd-compat/regress/closefromtest.c] Bug 1345: fix open() call.
25c1216a 1490 Report/patch by David.Leonard AT quest.com (and Bernhard Simon)
5498741c 1491 - (tim) [buildpkg.sh.in openssh.xml.in] Allow more flexibility where smf(5)
a817bc2b 1492 - (tim) [buildpkg.sh.in] s|$FAKE_ROOT/${sysconfdir}|$FAKE_ROOT${sysconfdir}|
af12bf9c 1493
665ca996 149420070628
1495 - (djm) bz#1325: Fix SELinux in permissive mode where it would
1496 incorrectly fatal() on errors. patch from cjwatson AT debian.org;
1497 ok dtucker
1498
91044296 149920070625
1500 - (dtucker) OpenBSD CVS Sync
1501 - djm@cvs.openbsd.org 2007/06/13 00:21:27
1502 [scp.c]
1503 don't ftruncate() non-regular files; bz#1236 reported by wood AT
1504 xmission.com; ok dtucker@
2c505585 1505 - djm@cvs.openbsd.org 2007/06/14 21:43:25
1506 [ssh.c]
1507 handle EINTR when waiting for mux exit status properly
50455824 1508 - djm@cvs.openbsd.org 2007/06/14 22:48:05
1509 [ssh.c]
1510 when waiting for the multiplex exit status, read until the master end
1511 writes an entire int of data *and* closes the client_fd; fixes mux
1512 regression spotted by dtucker, ok dtucker@
5a5e8b42 1513 - djm@cvs.openbsd.org 2007/06/19 02:04:43
1514 [atomicio.c]
1515 if the fd passed to atomicio/atomiciov() is non blocking, then poll() to
1516 avoid a spin if it is not yet ready for reading/writing; ok dtucker@
d9245683 1517 - dtucker@cvs.openbsd.org 2007/06/25 08:20:03
1518 [channels.c]
1519 Correct test for window updates every three packets; prevents sending
1520 window updates for every single packet. ok markus@
12ae19b0 1521 - dtucker@cvs.openbsd.org 2007/06/25 12:02:27
1522 [atomicio.c]
1523 Include <poll.h> like the man page says rather than <sys/poll.h>. ok djm@
15aaadea 1524 - (dtucker) [atomicio.c] Test for EWOULDBLOCK in atomiciov to match
1525 atomicio.
6d39a5c4 1526 - (dtucker) [atomicio.c configure.ac openbsd-compat/Makefile.in
1527 openbsd-compat/bsd-poll.{c,h} openbsd-compat/openbsd-compat.h]
1528 Add an implementation of poll() built on top of select(2). Code from
1529 OpenNTPD with changes suggested by djm. ok djm@
91044296 1530
cc43e894 153120070614
1532 - (dtucker) [cipher-ctr.c umac.c openbsd-compat/openssl-compat.h] Move the
1533 USE_BUILTIN_RIJNDAEL compat goop to openssl-compat.h so it can be
1534 shared with umac.c. Allows building with OpenSSL 0.9.5 again including
1535 umac support. With tim@ djm@, ok djm.
bff0be25 1536 - (dtucker) [openbsd-compat/openssl-compat.h] Merge USE_BUILTIN_RIJNDAEL
1537 sections. Fixes builds with early OpenSSL 0.9.6 versions.
9c9c3030 1538 - (dtucker) [openbsd-compat/openssl-compat.h] Remove redundant definition
1539 of USE_BUILTIN_RIJNDAEL since the <0.9.6 test is covered by the
1540 subsequent <0.9.7 test.
cc43e894 1541
e110afc3 154220070612
1543 - (dtucker) OpenBSD CVS Sync
1544 - markus@cvs.openbsd.org 2007/06/11 09:14:00
1545 [channels.h]
1546 increase default channel windows; ok djm
8f41056c 1547 - djm@cvs.openbsd.org 2007/06/12 07:41:00
1548 [ssh-add.1]
1549 better document ssh-add's -d option (delete identies from agent), bz#1224
1550 new text based on some provided by andrewmc-debian AT celt.dias.ie;
1551 ok dtucker@
73d4e9cc 1552 - djm@cvs.openbsd.org 2007/06/12 08:20:00
1553 [ssh-gss.h gss-serv.c gss-genr.c]
1554 relocate server-only GSSAPI code from libssh to server; bz #1225
1555 patch from simon AT sxw.org.uk; ok markus@ dtucker@
4634ee16 1556 - djm@cvs.openbsd.org 2007/06/12 08:24:20
1557 [scp.c]
1558 make scp try to skip FIFOs rather than blocking when nothing is listening.
1559 depends on the platform supporting sane O_NONBLOCK semantics for open
1560 on FIFOs (apparently POSIX does not mandate this), which OpenBSD does.
1561 bz #856; report by cjwatson AT debian.org; ok markus@
5805c516 1562 - djm@cvs.openbsd.org 2007/06/12 11:11:08
1563 [ssh.c]
1564 fix slave exit value when a control master goes away without passing the
1565 full exit status by ensuring that the slave reads a full int. bz#1261
1566 reported by frekko AT gmail.com; ok markus@ dtucker@
b2f4d5cc 1567 - djm@cvs.openbsd.org 2007/06/12 11:15:17
1568 [ssh.c ssh.1]
1569 Add "-K" flag for ssh to set GSSAPIAuthentication=yes and
1570 GSSAPIDelegateCredentials=yes. This is symmetric with -k (disable GSSAPI)
1571 and is useful for hosts with /home on Kerberised NFS; bz #1312
1572 patch from Markus.Kuhn AT cl.cam.ac.uk; ok dtucker@ markus@
6b34f31f 1573 - djm@cvs.openbsd.org 2007/06/12 11:45:27
1574 [ssh.c]
1575 improved exit message from multiplex slave sessions; bz #1262
1576 reported by alexandre.nunes AT gmail.com; ok dtucker@
dc1c8785 1577 - dtucker@cvs.openbsd.org 2007/06/12 11:56:15
1578 [gss-genr.c]
1579 Pass GSS OID to gss_display_status to provide better information in
1580 error messages. Patch from Simon Wilkinson via bz 1220. ok djm@
c159f720 1581 - jmc@cvs.openbsd.org 2007/06/12 13:41:03
1582 [ssh-add.1]
1583 identies -> identities;
3c6a67c2 1584 - jmc@cvs.openbsd.org 2007/06/12 13:43:55
1585 [ssh.1]
1586 add -K to SYNOPSIS;
5be98986 1587 - dtucker@cvs.openbsd.org 2007/06/12 13:54:28
1588 [scp.c]
1589 Encode filename with strnvis if the name contains a newline (which can't
1590 be represented in the scp protocol), from bz #891. ok markus@
e110afc3 1591
bd6a1355 159220070611
1593 - (djm) Bugzilla #1306: silence spurious error messages from hang-on-exit
1594 fix; tested by dtucker@ and jochen.kirn AT gmail.com
f444d0f8 1595 - pvalchev@cvs.openbsd.org 2007/06/07 19:37:34
1596 [kex.h mac.c mac.h monitor_wrap.c myproposal.h packet.c ssh.1]
1597 [ssh_config.5 sshd.8 sshd_config.5]
1598 Add a new MAC algorithm for data integrity, UMAC-64 (not default yet,
1599 must specify umac-64@openssh.com). Provides about 20% end-to-end speedup
1600 compared to hmac-md5. Represents a different approach to message
1601 authentication to that of HMAC that may be beneficial if HMAC based on
1602 one of its underlying hash algorithms is found to be vulnerable to a
1603 new attack. http://www.ietf.org/rfc/rfc4418.txt
1604 in conjunction with and OK djm@
c22b0835 1605 - pvalchev@cvs.openbsd.org 2007/06/08 04:40:40
1606 [ssh_config]
1607 Add a "MACs" line after "Ciphers" with the default MAC algorithms,
1608 to ease people who want to tweak both (eg. for performance reasons).
1609 ok deraadt@ djm@ dtucker@
bbc77085 1610 - jmc@cvs.openbsd.org 2007/06/08 07:43:46
1611 [ssh_config.5]
1612 put the MAC list into a display, like we do for ciphers,
1613 since groff has trouble handling wide lines;
33d2ae0f 1614 - jmc@cvs.openbsd.org 2007/06/08 07:48:09
1615 [sshd_config.5]
1616 oops, here too: put the MAC list into a display, like we do for
1617 ciphers, since groff has trouble with wide lines;
68a73f53 1618 - markus@cvs.openbsd.org 2007/06/11 08:04:44
1619 [channels.c]
1620 send 'window adjust' messages every tree packets and do not wait
1621 until 50% of the window is consumed. ok djm dtucker
1aac2117 1622 - (djm) [configure.ac umac.c] If platform doesn't provide swap32(3), then
1623 fallback to provided bit-swizzing functions
aee0a82f 1624 - (dtucker) [openbsd-compat/bsd-misc.c] According to the spec the "remainder"
1625 argument to nanosleep may be NULL. Currently this never happens in OpenSSH,
1626 but check anyway in case this changes or the code gets used elsewhere.
e9b2809d 1627 - (dtucker) [includes.h] Bug #1243: HAVE_PATHS -> HAVE_PATHS_H. Should
1628 prevent warnings about redefinitions of various things in paths.h.
1629 Spotted by cartmanltd at hotmail.com.
c22b0835 1630
c33de4d8 163120070605
1632 - (dtucker) OpenBSD CVS Sync
1633 - djm@cvs.openbsd.org 2007/05/22 10:18:52
1634 [sshd.c]
1635 zap double include; from p_nowaczyk AT o2.pl
1636 (not required in -portable, Id sync only)
68525040 1637 - djm@cvs.openbsd.org 2007/05/30 05:58:13
1638 [kex.c]
1639 tidy: KNF, ARGSUSED and u_int
e473dcd1 1640 - jmc@cvs.openbsd.org 2007/05/31 19:20:16
1641 [scp.1 ssh_config.5 sftp-server.8 ssh-agent.1 sshd_config.5 sftp.1
1642 ssh-keygen.1 ssh-keyscan.1 ssh-add.1 sshd.8 ssh.1 ssh-keysign.8]
1643 convert to new .Dd format;
1644 (We will need to teach mdoc2man.awk to understand this too.)
d156cd22 1645 - djm@cvs.openbsd.org 2007/05/31 23:34:29
1646 [packet.c]
1647 gc unreachable code; spotted by Tavis Ormandy
996279fc 1648 - djm@cvs.openbsd.org 2007/06/02 09:04:58
1649 [bufbn.c]
1650 memory leak on error path; from arnaud.lacombe.1 AT ulaval.ca
a3de8da1 1651 - djm@cvs.openbsd.org 2007/06/05 06:52:37
1652 [kex.c monitor_wrap.c packet.c mac.h kex.h mac.c]
1653 Preserve MAC ctx between packets, saving 2xhash calls per-packet.
1654 Yields around a 12-16% end-to-end speedup for arcfour256/hmac-md5
1655 patch from markus@ tested dtucker@ and myself, ok markus@ and me (I'm
1656 committing at his request)
f43b2695 1657 - (dtucker) [mdoc2man.awk] Teach it to deal with $Mdocdate tags that
1658 OpenBSD's cvs now adds.
8c5a3b27 1659 - (dtucker) [mdoc2man.awk] Remove trailing "$" from Mdocdate regex so
1660 mindrot's cvs doesn't expand it on us.
757841b2 1661 - (dtucker) [mdoc2man.awk] Add support for %R references, used for RFCs.
c33de4d8 1662
2e5c9c30 166320070520
1664 - (dtucker) OpenBSD CVS Sync
1665 - stevesk@cvs.openbsd.org 2007/04/14 22:01:58
1666 [auth2.c]
1667 remove unused macro; from Dmitry V. Levin <ldv@altlinux.org>
23983bf9 1668 - stevesk@cvs.openbsd.org 2007/04/18 01:12:43
1669 [sftp-server.c]
1670 cast "%llu" format spec to (unsigned long long); do not assume a
1671 u_int64_t arg is the same as 'unsigned long long'.
1672 from Dmitry V. Levin <ldv@altlinux.org>
1673 ok markus@ 'Yes, that looks correct' millert@
51b787f2 1674 - dtucker@cvs.openbsd.org 2007/04/23 10:15:39
1675 [servconf.c]
1676 Remove debug() left over from development. ok deraadt@
7ce05acc 1677 - djm@cvs.openbsd.org 2007/05/17 07:50:31
1678 [log.c]
1679 save and restore errno when logging; ok deraadt@
72dea2d9 1680 - djm@cvs.openbsd.org 2007/05/17 07:55:29
1681 [sftp-server.c]
1682 bz#1286 stop reading and processing commands when input or output buffer
1683 is nearly full, otherwise sftp-server would happily try to grow the
1684 input/output buffers past the maximum supported by the buffer API and
1685 promptly fatal()
1686 based on patch from Thue Janus Kristensen; feedback & ok dtucker@
7fd1deb2 1687 - djm@cvs.openbsd.org 2007/05/17 20:48:13
1688 [sshconnect2.c]
1689 fall back to gethostname() when the outgoing connection is not
1690 on a socket, such as is the case when ProxyCommand is used.
1691 Gives hostbased auth an opportunity to work; bz#616, report
1692 and feedback stuart AT kaloram.com; ok markus@
21cd42db 1693 - djm@cvs.openbsd.org 2007/05/17 20:52:13
1694 [monitor.c]
1695 pass received SIGINT from monitor to postauth child so it can clean
1696 up properly. bz#1196, patch from senthilkumar_sen AT hotpop.com;
1697 ok markus@
b2349766 1698 - jolan@cvs.openbsd.org 2007/05/17 23:53:41
1699 [sshconnect2.c]
1700 djm owes me a vb and a tism cd for breaking ssh compilation
fd8f181b 1701 - (dtucker) [auth-pam.c] malloc+memset -> calloc. Patch from
1702 ldv at altlinux.org.
e2dedae7 1703 - (dtucker) [auth-pam.c] Return empty string if fgets fails in
1704 sshpam_tty_conv. Patch from ldv at altlinux.org.
2e5c9c30 1705
40701614 170620070509
1707 - (tim) [configure.ac] Bug #1287: Add missing test for ucred.h.
1708
65737b47 170920070429
1710 - (dtucker) [openbsd-compat/bsd-misc.c] Include unistd.h and sys/types.h
1711 for select(2) prototype.
e5b792cd 1712 - (dtucker) [auth-shadow.c loginrec.c] Include time.h for time(2) prototype.
560acf80 1713 - (dtucker) [configure.ac openbsd-compat/getrrsetbyname.c] Bug #1299: Use the
1714 platform's _res if it has one. Should fix problem of DNSSEC record lookups
1715 on NetBSD as reported by Curt Sampson.
81fa3f37 1716 - (dtucker) [openbsd-compat/xmmap.c] Include stdlib.h for mkstemp prototype.
0bf6279d 1717 - (dtucker) [configure.ac defines.h] Have configure check for MAXSYMLINKS
1718 so we don't get redefinition warnings.
0b9fdeb8 1719 - (dtucker) [openbsd-compat/xmmap.c] Include stdlib.h for mkstemp prototype.
1720 - (dtucker) [configure.ac defines.h] Prevent warnings about __attribute__
1721 __nonnull__ for versions of GCC that don't support it.
b41ece30 1722 - (dtucker) [configure.ac defines.h] Have configure check for offsetof
1723 to prevent redefinition warnings.
0b9fdeb8 1724
6b44d402 172520070406
1726 - (dtucker) [INSTALL] Update the systems that have PAM as standard. Link
1727 to OpenPAM too.
e5d352eb 1728 - (dtucker) [INSTALL] prngd lives at sourceforge these days.
6b44d402 1729
a03acb8f 173020070326
1731 - (tim) [auth.c configure.ac defines.h session.c openbsd-compat/port-uw.c
1732 openbsd-compat/port-uw.h openbsd-compat/xcrypt.c] Rework libiaf test/defines
1733 to account for IRIX having libiaf but not set_id(). Patch with & ok dtucker@
1734
e54defb4 173520070325
1736 - (dtucker) [Makefile.in configure.ac] Replace single-purpose LIBSELINUX,
1737 LIBWRAP and LIBPAM variables in Makefile with the general-purpose
1738 SSHDLIBS. "I like" djm@
1739
136d42b7 174020070321
1741 - (dtucker) OpenBSD CVS Sync
1742 - dtucker@cvs.openbsd.org 2007/03/09 05:20:06
1743 [servconf.c sshd.c]
1744 Move C/R -> kbdint special case to after the defaults have been
1745 loaded, which makes ChallengeResponse default to yes again. This
1746 was broken by the Match changes and not fixed properly subsequently.
1747 Found by okan at demirmen.com, ok djm@ "please do it" deraadt@
e93309c3 1748 - djm@cvs.openbsd.org 2007/03/19 01:01:29
1749 [sshd_config]
1750 Disable the legacy SSH protocol 1 for new installations via
1751 a configuration override. In the future, we will change the
1752 server's default itself so users who need the legacy protocol
1753 will need to turn it on explicitly
7f38e62e 1754 - dtucker@cvs.openbsd.org 2007/03/19 12:16:42
1755 [ssh-agent.c]
1756 Remove the signal handler that checks if the agent's parent process
1757 has gone away, instead check when the select loop returns. Record when
1758 the next key will expire when scanning for expired keys. Set the select
1759 timeout to whichever of these two things happens next. With djm@, with &
1760 ok deraadt@ markus@
f48fbab3 1761 - tedu@cvs.openbsd.org 2007/03/20 03:56:12
1762 [readconf.c clientloop.c]
1763 remove some bogus *p tests from charles longeau
1764 ok deraadt millert
82029813 1765 - jmc@cvs.openbsd.org 2007/03/20 15:57:15
1766 [sshd.8]
1767 - let synopsis and description agree for -f
1768 - sort FILES
1769 - +.Xr ssh-keyscan 1 ,
1770 from Igor Sobrado
1961d660 1771 - (dtucker) [configure.ac openbsd-compat/bsd-getpeereid.c] Bug #1287: Use
1772 getpeerucred to implement getpeereid (currently only Solaris 10 and up).
1773 Patch by Jan.Pechanec at Sun.
aee1c971 1774 - (dtucker) [regress/agent-getpeereid.sh] Do peereid test if we have
1775 HAVE_GETPEERUCRED too. Also from Jan Pechanec.
136d42b7 1776
fce809d2 177720070313
1778 - (dtucker) [entropy.c scard-opensc.c ssh-rand-helper.c] Bug #1294: include
1779 string.h to prevent warnings, from vapier at gentoo.org.
5425009d 1780 - (dtucker) [LICENCE] Add Daniel Walsh as a copyright holder for the
1781 selinux bits in -portable.
ab26a796 1782 - (dtucker) [cipher-3des1.c cipher-bf1.c] The OpenSSL 0.9.8e problem in
1783 bug #1291 also affects Protocol 1 3des. While at it, use compat-openssl.h
1784 in cipher-bf1.c. Patch from Juan Gallego.
76ef2ed2 1785 - (dtucker) [README.platform] Info about blibpath on AIX.
fce809d2 1786
a863b75f 178720070306
1788 - (djm) OpenBSD CVS Sync
1789 - jmc@cvs.openbsd.org 2007/03/01 16:19:33
1790 [sshd_config.5]
1791 sort the `match' keywords;
95d6e8af 1792 - djm@cvs.openbsd.org 2007/03/06 10:13:14
1793 [version.h]
1794 openssh-4.6; "please" deraadt@
0a052bfe 1795 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1796 [contrib/suse/openssh.spec] crank spec files for release
9b86b75a 1797 - (djm) [README] correct link to release notes
68ff14ce 1798 - (djm) Release 4.6p1
a863b75f 1799
1d42bcce 180020070304
1801 - (djm) [configure.ac] add a --without-openssl-header-check option to
1802 configure, as some platforms (OS X) ship OpenSSL headers whose version
1803 does not match that of the shipping library. ok dtucker@
190d9b26 1804 - (dtucker) [openbsd-compat/openssl-compat.h] Bug #1291: Work around a
1805 bug in OpenSSL 0.9.8e that prevents aes256-ctr, aes192-ctr and arcfour256
1806 ciphers from working correctly (disconnects with "Bad packet length"
1807 errors) as found by Ben Harris. ok djm@
1d42bcce 1808
f0bbbd78 180920070303
1810 - (dtucker) [regress/agent-ptrace.sh] Make ttrace gdb error a little more
1811 general to cover newer gdb versions on HP-UX.
1812
04765d02 181320070302
1814 - (dtucker) [configure.ac] For Cygwin, read files in textmode (which allows
1815 CRLF as well as LF lineendings) and write in binary mode. Patch from
1816 vinschen at redhat.com.
2769e5d0 1817 - (dtucker) [INSTALL] Update to autoconf-2.61.
04765d02 1818
121c4a34 181920070301
1820 - (dtucker) OpenBSD CVS Sync
1821 - dtucker@cvs.openbsd.org 2007/03/01 10:28:02
1822 [auth2.c sshd_config.5 servconf.c]
1823 Remove ChallengeResponseAuthentication support inside a Match
1824 block as its interaction with KbdInteractive makes it difficult to
1825 support. Also, relocate the CR/kbdint option special-case code into
1826 servconf. "please commit" djm@, ok markus@ for the relocation.
840bd607 1827 - (tim) [buildpkg.sh.in openssh.xml.in] Clean up Solaris 10 smf(5) bits.
1828 "Looks sane" dtucker@
121c4a34 1829
f10f9102 183020070228
1831 - (dtucker) OpenBSD CVS Sync
1832 - dtucker@cvs.openbsd.org 2007/02/28 00:55:30
1833 [ssh-agent.c]
1834 Remove expired keys periodically so they don't remain in memory when
1835 the agent is entirely idle, as noted by David R. Piegdon. This is the
1836 simple fix, a more efficient one will be done later. With markus,
1837 deraadt, with & ok djm.
1838
88ea6a3c 183920070225
1840 - (dtucker) OpenBSD CVS Sync
1841 - djm@cvs.openbsd.org 2007/02/20 10:25:14
1842 [clientloop.c]
1843 set maximum packet and window sizes the same for multiplexed clients
1844 as normal connections; ok markus@
1e823acf 1845 - dtucker@cvs.openbsd.org 2007/02/21 11:00:05
1846 [sshd.c]
1847 Clear alarm() before restarting sshd on SIGHUP. Without this, if there's
1848 a SIGALRM pending (for SSH1 key regeneration) when sshd is SIGHUP'ed, the
1849 newly exec'ed sshd will get the SIGALRM and not have a handler for it,
1850 and the default action will terminate the listening sshd. Analysis and
1851 patch from andrew at gaul.org.
f3e3d6ce 1852 - dtucker@cvs.openbsd.org 2007/02/22 12:58:40
1853 [servconf.c]
1854 Check activep so Match and GatewayPorts work together; ok markus@
8c1cb72e 1855 - ray@cvs.openbsd.org 2007/02/24 03:30:11
1856 [moduli.c]
1857 - strlen returns size_t, not int.
1858 - Pass full buffer size to fgets.
1859 OK djm@, millert@, and moritz@.
88ea6a3c 1860
5792fbb7 186120070219
1862 - (dtucker) OpenBSD CVS Sync
1863 - jmc@cvs.openbsd.org 2007/01/10 13:23:22
1864 [ssh_config.5]
1865 do not use a list for SYNOPSIS;
1866 this is actually part of a larger report sent by eric s. raymond
1867 and forwarded by brad, but i only read half of it. spotted by brad.
e91a8c3f 1868 - jmc@cvs.openbsd.org 2007/01/12 20:20:41
1869 [ssh-keygen.1 ssh-keygen.c]
1870 more secsh -> rfc 4716 updates;
1871 spotted by wiz@netbsd
1872 ok markus
70b5e752 1873 - dtucker@cvs.openbsd.org 2007/01/17 23:22:52
1874 [readconf.c]
1875 Honour activep for times (eg ServerAliveInterval) while parsing
1876 ssh_config and ~/.ssh/config so they work properly with Host directives.
1877 From mario.lorenz@wincor-nixdorf.com via bz #1275. ok markus@
1878 - stevesk@cvs.openbsd.org 2007/01/21 01:41:54
1879 [auth-skey.c kex.c ssh-keygen.c session.c clientloop.c]
1880 spaces
0cf6a024 1881 - stevesk@cvs.openbsd.org 2007/01/21 01:45:35
1882 [readconf.c]
1883 spaces
e4d5ca17 1884 - djm@cvs.openbsd.org 2007/01/22 11:32:50
1885 [sftp-client.c]
1886 return error from do_upload() when a write fails. fixes bz#1252: zero
1887 exit status from sftp when uploading to a full device. report from
1888 jirkat AT atlas.cz; ok dtucker@
7df0afaf 1889 - djm@cvs.openbsd.org 2007/01/22 13:06:21
1890 [scp.c]
1891 fix detection of whether we should show progress meter or not: scp
1892 tested isatty(stderr) but wrote the progress meter to stdout. This patch
1893 makes it test stdout. bz#1265 reported by junkmail AT bitsculpture.com;
1894 of dtucker@
1b313731 1895 - stevesk@cvs.openbsd.org 2007/02/14 14:32:00
1896 [bufbn.c]
1897 typos in comments; ok jmc@
03bcbf84 1898 - dtucker@cvs.openbsd.org 2007/02/19 10:45:58
1899 [monitor_wrap.c servconf.c servconf.h monitor.c sshd_config.5]
1900 Teach Match how handle config directives that are used before
1901 authentication. This allows configurations such as permitting password
1902 authentication from the local net only while requiring pubkey from
1903 offsite. ok djm@, man page bits ok jmc@
99d804ce 1904 - (dtucker) [contrib/findssl.sh] Add "which" as a shell function since some
1905 platforms don't have it. Patch from dleonard at vintela.com.
56a6f96f 1906 - (dtucker) [openbsd-compat/getrrsetbyname.c] Don't attempt to calloc
1907 an array for signatures when there are none since "calloc(0, n) returns
1908 NULL on some platforms (eg Tru64), which is explicitly permitted by
1909 POSIX. Diagnosis and patch by svallet genoscope.cns.fr.
5792fbb7 1910
34640ce6 191120070128
1912 - (djm) [channels.c serverloop.c] Fix so-called "hang on exit" (bz #52)
1913 when closing a tty session when a background process still holds tty
1914 fds open. Great detective work and patch by Marc Aurele La France,
1915 slightly tweaked by me; ok dtucker@
1916
4b478cc5 191720070123
1918 - (dtucker) [openbsd-compat/bsd-snprintf.c] Static declarations for public
1919 library interfaces aren't very helpful. Fix up the DOPR_OUTCH macro
1920 so it works properly and modify its callers so that they don't pre or
1921 post decrement arguments that are conditionally evaluated. While there,
1922 put SNPRINTF_CONST back as it prevents build failures in some
1923 configurations. ok djm@ (for most of it)
1924
ed9b5e5f 192520070122
1926 - (djm) [ssh-rand-helper.8] manpage nits;
1927 from dleonard AT vintela.com (bz#1529)
1928
25bd7a2a 192920070117
1930 - (dtucker) [packet.c] Re-remove in_systm.h since it's already in includes.h
1931 and multiple including it causes problems on old IRIXes. (It snuck back
1932 in during a sync.) Found (again) by Georg Schwarz.
1933
b05ff3f5 193420070114
7ac507d4 1935 - (dtucker) [ssh-keygen.c] av -> argv to match earlier sync.
0d00c5cb 1936 - (djm) [openbsd-compat/bsd-snprintf.c] Fix integer overflow in return
1937 value of snprintf replacement, similar to bugs in various libc
1938 implementations. This overflow is not exploitable in OpenSSH.
1939 While I'm fiddling with it, make it a fair bit faster by inlining the
1940 append-char routine; ok dtucker@
b05ff3f5 1941
4b4810d4 194220070105
1943 - (djm) OpenBSD CVS Sync
1944 - deraadt@cvs.openbsd.org 2006/11/14 19:41:04
1945 [ssh-keygen.c]
1946 use argc and argv not some made up short form
ce4cf693 1947 - ray@cvs.openbsd.org 2006/11/23 01:35:11
1948 [misc.c sftp.c]
1949 Don't access buf[strlen(buf) - 1] for zero-length strings.
1950 ``ok by me'' djm@.
4e3c0053 1951 - markus@cvs.openbsd.org 2006/12/11 21:25:46
1952 [ssh-keygen.1 ssh.1]
1953 add rfc 4716 (public key format); ok jmc
04efe9b0 1954 - djm@cvs.openbsd.org 2006/12/12 03:58:42
1955 [channels.c compat.c compat.h]
1956 bz #1019: some ssh.com versions apparently can't cope with the
1957 remote port forwarding bind_address being a hostname, so send
1958 them an address for cases where they are not explicitly
1959 specified (wildcard or localhost bind). reported by daveroth AT
1960 acm.org; ok dtucker@ deraadt@
75b6d52c 1961 - dtucker@cvs.openbsd.org 2006/12/13 08:34:39
1962 [servconf.c]
1963 Make PermitOpen work with multiple values like the man pages says.
1964 bz #1267 with details from peter at dmtz.com, with & ok djm@
38757197 1965 - dtucker@cvs.openbsd.org 2006/12/14 10:01:14
1966 [servconf.c]
1967 Make "PermitOpen all" first-match within a block to match the way other
1968 options work. ok markus@ djm@
5d9a4204 1969 - jmc@cvs.openbsd.org 2007/01/02 09:57:25
1970 [sshd_config.5]
1971 do not use lists for SYNOPSIS;
1972 from eric s. raymond via brad
cbaa43c0 1973 - stevesk@cvs.openbsd.org 2007/01/03 00:53:38
1974 [ssh-keygen.c]
1975 remove small dead code; arnaud.lacombe.1@ulaval.ca via Coverity scan
4f6e2ba9 1976 - stevesk@cvs.openbsd.org 2007/01/03 03:01:40
1977 [auth2-chall.c channels.c dns.c sftp.c ssh-keygen.c ssh.c]
1978 spaces
c9625a42 1979 - stevesk@cvs.openbsd.org 2007/01/03 04:09:15
1980 [sftp.c]
1981 ARGSUSED for lint
9a24ac07 1982 - stevesk@cvs.openbsd.org 2007/01/03 07:22:36
1983 [sftp-server.c]
1984 spaces
4b4810d4 1985
2b563deb 198620061205
1987 - (djm) [auth.c] Fix NULL pointer dereference in fakepw(). Crash would
1988 occur if the server did not have the privsep user and an invalid user
1989 tried to login and both privsep and krb5 auth are disabled; ok dtucker@
096393b8 1990 - (djm) [bsd-asprintf.c] Better test for bad vsnprintf lengths; ok dtucker@
2b563deb 1991
d4d9db8d 199220061108
1993 - (dtucker) OpenBSD CVS Sync
1994 - markus@cvs.openbsd.org 2006/11/07 13:02:07
1995 [dh.c]
1996 BN_hex2bn returns int; from dtucker@
1997
4d02b823 199820061107
1999 - (dtucker) [sshd.c] Use privsep_pw if we have it, but only require it
2000 if we absolutely need it. Pointed out by Corinna, ok djm@
e516451d 2001 - (dtucker) OpenBSD CVS Sync
2002 - markus@cvs.openbsd.org 2006/11/06 21:25:28
2003 [auth-rsa.c kexgexc.c kexdhs.c key.c ssh-dss.c sshd.c kexgexs.c
2004 ssh-keygen.c bufbn.c moduli.c scard.c kexdhc.c sshconnect1.c dh.c rsa.c]
2005 add missing checks for openssl return codes; with & ok djm@
89916e8c 2006 - markus@cvs.openbsd.org 2006/11/07 10:31:31
2007 [monitor.c version.h]
2008 correctly check for bad signatures in the monitor, otherwise the monitor
2009 and the unpriv process can get out of sync. with dtucker@, ok djm@,
2010 dtucker@
5b296f76 2011 - (dtucker) [README contrib/{caldera,redhat,contrib}/openssh.spec] Bump
2012 versions.
4354f73b 2013 - (dtucker) Release 4.5p1.
4d02b823 2014
b8e51e81 201520061105
2016 - (djm) OpenBSD CVS Sync
2017 - otto@cvs.openbsd.org 2006/10/28 18:08:10
2018 [ssh.1]
2019 correct/expand example of usage of -w; ok jmc@ stevesk@
8e8b473c 2020 - markus@cvs.openbsd.org 2006/10/31 16:33:12
2021 [kexdhc.c kexdhs.c kexgexc.c kexgexs.c]
2022 check DH_compute_key() for -1 even if it should not happen because of
2023 earlier calls to dh_pub_is_valid(); report krahmer at suse.de; ok djm
b8e51e81 2024
8852e1d4 202520061101
2026 - (dtucker) [openbsd-compat/port-solaris.c] Bug #1255: Make only hwerr
2027 events fatal in Solaris process contract support and tell it to signal
2028 only processes in the same process group when something happens.
2029 Based on information from andrew.benham at thus.net and similar to
2030 a patch from Chad Mynhier. ok djm@
2031
1acc8e56 203220061027
2033- (djm) [auth.c] gc some dead code
2034
b3c338b7 203520061023
2036 - (djm) OpenBSD CVS Sync
2037 - ray@cvs.openbsd.org 2006/09/30 17:48:22
2038 [sftp.c]
2039 Clear errno before calling the strtol functions.
2040 From Paul Stoeber <x0001 at x dot de1 dot cc>.
2041 OK deraadt@.
fceb95fa 2042 - djm@cvs.openbsd.org 2006/10/06 02:29:19
2043 [ssh-agent.c ssh-keyscan.c ssh.c]
2044 sys/resource.h needs sys/time.h; prompted by brad@
2045 (NB. Id sync only for portable)
db6fcd65 2046 - djm@cvs.openbsd.org 2006/10/09 23:36:11
2047 [session.c]
2048 xmalloc -> xcalloc that was missed previously, from portable
2049 (NB. Id sync only for portable, obviously)
77903f77 2050 - markus@cvs.openbsd.org 2006/10/10 10:12:45
2051 [sshconnect.c]
2052 sleep before retrying (not after) since sleep changes errno; fixes
2053 pr 5250; rad@twig.com; ok dtucker djm
bd3b2cb2 2054 - markus@cvs.openbsd.org 2006/10/11 12:38:03
2055 [clientloop.c serverloop.c]
2056 exit instead of doing a blocking tcp send if we detect a client/server
2057 timeout, since the tcp sendqueue might be already full (of alive
2058 requests); ok dtucker, report mpf
cdfbded8 2059 - djm@cvs.openbsd.org 2006/10/22 02:25:50
2060 [sftp-client.c]
2061 cancel progress meter when upload write fails; ok deraadt@
0f74133a 2062 - (tim) [Makefile.in scard/Makefile.in] Add datarootdir= lines to keep
2063 autoconf 2.60 from complaining.
b3c338b7 2064
525251b0 206520061018
2066 - (dtucker) OpenBSD CVS Sync
2067 - ray@cvs.openbsd.org 2006/09/25 04:55:38
2068 [ssh-keyscan.1 ssh.1]
2069 Change "a SSH" to "an SSH". Hurray, I'm not the only one who
2070 pronounces "SSH" as "ess-ess-aich".
2071 OK jmc@ and stevesk@.
d1f7ec98 2072 - (dtucker) [sshd.c] Reshuffle storing of pw struct; prevents warnings
2073 on older versions of OS X. ok djm@
525251b0 2074
8153fef1 207520061016
2076 - (dtucker) [monitor_fdpass.c] Include sys/in.h, required for cmsg macros
2077 on older (2.0) Linuxes. Based on patch from thmo-13 at gmx de.
2078
1f231631 207920061006
2080 - (tim) [buildpkg.sh.in] Use uname -r instead of -v in OS_VER for Solaris.
2081 Differentiate between OpenServer 5 and OpenServer 6
5ba277eb 2082 - (dtucker) [configure.ac] Set put -lselinux into $LIBS while testing for
2083 SELinux functions so they're detected correctly. Patch from pebenito at
2084 gentoo.org.
b18359f6 2085 - (tim) [buildpkg.sh.in] Some systems have really limited nawk (OpenServer).
2086 Allow setting alternate awk in openssh-config.local.
1f231631 2087
aa56f760 208820061003
2089 - (tim) [configure.ac] Move CHECK_HEADERS test before platform specific
2090 section so additional platform specific CHECK_HEADER tests will work
2091 correctly. Fixes "<net/if_tap.h> on FreeBSD" problem report by des AT des.no
2092 Feedback and "seems like a good idea" dtucker@
2093
00dea73e 209420061001
2095 - (dtucker) [audit-bsm.c] Include errno.h. Pointed out by des at des.no.
2096
24b2647b 209720060929
2098 - (dtucker) [configure.ac] Bug #1239: Fix configure test for OpenSSH engine
2099 support. Patch from andrew.benham at thus net.
2100
243a64f1 210120060928
2102 - (dtucker) [entropy.c] Bug #1238: include signal.h to fix compilation error
2103 on Solaris 8 w/out /dev/random or prngd. Patch from rl at
2104 math.technion.ac.il.
2105
f0a2e834 210620060926
2107 - (dtucker) [bufaux.h] nuke bufaux.h; it's already gone from OpenBSD and not
2108 referenced any more. ok djm@
5ed1a353 2109 - (dtucker) [sftp-server.8] Resync; spotted by djm@
0eb97cdf 2110 - (dtucker) Release 4.4p1.
f0a2e834 2111
d6336595 211220060924
2113 - (tim) [configure.ac] Remove CFLAGS hack for UnixWare 1.x/2.x (added
2114 to rev 1.308) to work around broken gcc 2.x header file.
2115
530456f4 211620060923
2117 - (dtucker) [configure.ac] Bug #1234: Put opensc libs into $LIBS rather than
2118 $LDFLAGS. Patch from vapier at gentoo org.
2119
c5bca5d4 212020060922
2121 - (dtucker) [packet.c canohost.c] Include arpa/inet.h for htonl macros on
2122 some platforms (eg HP-UX 11.00). From santhi.amirta at gmail com.
2123
d3fc2aa3 212420060921
2125 - (dtucker) OpenBSD CVS Sync
2126 - otto@cvs.openbsd.org 2006/09/19 05:52:23
2127 [sftp.c]
2128 Use S_IS* macros insted of masking with S_IF* flags. The latter may
2129 have multiple bits set, which lead to surprising results. Spotted by
2130 Paul Stoeber, more to come. ok millert@ pedro@ jaredy@ djm@
a29c9898 2131 - markus@cvs.openbsd.org 2006/09/19 21:14:08
2132 [packet.c]
2133 client NULL deref on protocol error; Tavis Ormandy, Google Security Team
ffbfca72 2134 - (dtucker) [defines.h] Include unistd.h before defining getpgrp; fixes
2135 build error on Ultrix. From Bernhard Simon.
d3fc2aa3 2136
25a2779b 213720060918
2138 - (dtucker) [configure.ac] On AIX, check to see if the compiler will allow
2139 macro redefinitions, and if not, remove "-qlanglvl=ansi" from the flags.
2140 Allows build out of the box with older VAC and XLC compilers. Found by
2141 David Bronder and Bernhard Simon.
d9ed544b 2142 - (dtucker) [openbsd-compat/port-aix.{c,h}] Reduce scope of includes.
2143 Prevents macro redefinition warnings of "RDONLY".
25a2779b 2144
f0d0e025 214520060916
2146 - OpenBSD CVS Sync
2147 - djm@cvs.openbsd.org 2006/09/16 19:53:37
2148 [deattack.c deattack.h packet.c]
2149 limit maximum work performed by the CRC compensation attack detector,
2150 problem reported by Tavis Ormandy, Google Security Team;
2151 ok markus@ deraadt@
95954124 2152 - (djm) Add openssh.xml to .cvsignore and sort it
3fd7b98a 2153 - (dtucker) [auth-pam.c] Propogate TZ environment variable to PAM auth
2154 process so that any logging it does is with the right timezone. From
2155 Scott Strickler, ok djm@.
bb09a477 2156 - (dtucker) [monitor.c] Correctly handle auditing of single commands when
2157 using Protocol 1. From jhb at freebsd.
cd3e77c4 2158 - (djm) [sshd.c] Fix warning/API abuse; ok dtucker@
8e700494 2159 - (dtucker) [INSTALL] Add info about audit support.
f0d0e025 2160
29eadd7c 216120060912
2162 - (djm) [Makefile.in buildpkg.sh.in configure.ac openssh.xml.in]
2163 Support SMF in Solaris Packages if enabled by configure. Patch from
2164 Chad Mynhier, tested by dtucker@
2165
7238aaad 216620060911
2167 - (dtucker) [cipher-aes.c] Include string.h for memcpy and friends. Noted
2168 by Pekka Savola.
2169
d23046e2 217020060910
2171 - (dtucker) [contrib/aix/buildbff.sh] Ensure that perl is available.
36f36ba3 2172 - (dtucker) [configure.ac] Add -lcrypt to let DragonFly build OOTB.
d23046e2 2173
fa6edaf0 217420060909
2175 - (dtucker) [openbsd-compat/bsd-snprintf.c] Add stdarg.h.
d2f401fe 2176 - (dtucker) [contrib/aix/buildbff.sh] Always create privsep user.
16082eaa 2177 - (dtucker) [buildpkg.sh.in] Always create privsep user. ok djm@
fa6edaf0 2178
368a00c2 217920060908
2180 - (dtucker) [auth-sia.c] Add includes required for build on Tru64. Patch
2181 from Chris Adams.
a01f637d 2182 - (dtucker) [configure.ac] The BSM header test needs time.h in some cases.
368a00c2 2183
a078cbee 218420060907
2185 - (djm) [sshd.c auth.c] Set up fakepw() with privsep uid/gid, so it can
2186 be used to drop privilege to; fixes Solaris GSSAPI crash reported by
2187 Magnus Abrante; suggestion and feedback dtucker@
2188 NB. this change will require that the privilege separation user must
2189 exist on all the time, not just when UsePrivilegeSeparation=yes
5cc6ddad 2190 - (tim) [configure.ac] s/BROKEN_UPDWTMP/BROKEN_UPDWTMPX/ on SCO OSR6
4130b6f1 2191 - (dtucker) [loginrec.c] Wrap paths.h in HAVE_PATHS_H.
15367d95 2192 - (dtucker) [regress/cfgmatch.sh] stop_client is racy, so give us a better
2193 chance of winning.
a078cbee 2194
9286ecf2 219520060905
2196 - (dtucker) [configure.ac] s/AC_DEFINES/AC_DEFINE/ spotted by Roumen Petrov.
e0f3adac 2197 - (dtucker) [loginrec.c] Include paths.h for _PATH_BTMP.
9286ecf2 2198
62143a41 219920060904
2200 - (dtucker) [configure.ac] Define BROKEN_UPDWTMP on SCO OSR6 as the native
2201 updwdtmp seems to generate invalid wtmp entries. From Roger Cornelius,
2202 ok djm@
2203
752994dd 220420060903
2205 - (dtucker) [configure.ac openbsd-compat/openbsd-compat.h] Check for
2206 declaration of writev(2) and declare it ourselves if necessary. Makes
2207 the atomiciov() calls build on really old systems. ok djm@
2208
b823d0b9 220920060902
2210 - (dtucker) [openbsd-compat/port-irix.c] Add errno.h, found by Iain Morgan.
5e837c7b 2211 - (dtucker) [ssh-keyscan.c ssh-rand-helper.c ssh.c sshconnect.c
2212 openbsd-compat/bindresvport.c openbsd-compat/getrrsetbyname.c
2213 openbsd-compat/port-tun.c openbsd-compat/rresvport.c] Include <arpa/inet.h>
2214 for hton* and ntoh* macros. Required on (at least) HP-UX since we define
2215 _XOPEN_SOURCE_EXTENDED. Found by santhi.amirta at gmail com.
b823d0b9 2216
24436b92 221720060901
2218 - (djm) [audit-bsm.c audit.c auth-bsdauth.c auth-chall.c auth-pam.c]
2219 [auth-rsa.c auth-shadow.c auth-sia.c auth1.c auth2-chall.c]
2220 [auth2-gss.c auth2-kbdint.c auth2-none.c authfd.c authfile.c]
2221 [cipher-3des1.c cipher-aes.c cipher-bf1.c cipher-ctr.c clientloop.c]
2222 [dh.c dns.c entropy.c gss-serv-krb5.c gss-serv.c hostfile.c kex.c]
2223 [kexdhc.c kexdhs.c kexgexc.c kexgexs.c key.c loginrec.c mac.c]
2224 [md5crypt.c monitor.c monitor_wrap.c readconf.c rsa.c]
2225 [scard-opensc.c scard.c session.c ssh-add.c ssh-agent.c ssh-dss.c]
2226 [ssh-keygen.c ssh-keysign.c ssh-rsa.c ssh.c sshconnect.c]
aa751414 2227 [sshconnect1.c sshconnect2.c sshd.c]
24436b92 2228 [openbsd-compat/bsd-cray.c openbsd-compat/port-aix.c]
2229 [openbsd-compat/port-linux.c openbsd-compat/port-solaris.c]
2230 [openbsd-compat/port-uw.c]
2231 Lots of headers for SCO OSR6, mainly adding stdarg.h for log.h;
2232 compile problems reported by rac AT tenzing.org
aa751414 2233 - (djm) [includes.h monitor.c openbsd-compat/bindresvport.c]
2234 [openbsd-compat/rresvport.c] Some more headers: netinet/in.h
2235 sys/socket.h and unistd.h in various places
dd41ba6f 2236 - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Fix implict declaration
2237 warnings for binary_open and binary_close. Patch from Corinna Vinschen.
78888bab 2238 - (dtucker) [configure.ac includes.h openbsd-compat/glob.{c,h}] Explicitly
2239 test for GLOB_NOMATCH and use our glob functions if it's not found.
2240 Stops sftp from segfaulting when attempting to get a nonexistent file on
2241 Cygwin (previous versions of OpenSSH didn't use the native glob). Partly
2242 from and tested by Corinna Vinschen.
cdc9d1fc 2243 - (dtucker) [README contrib/{caldera,redhat,suse}/openssh.spec] Crank
2244 versions.
24436b92 2245
5b84789f 224620060831
2247 - (djm) [CREDITS LICENCE Makefile.in auth.c configure.ac includes.h ]
2248 [platform.c platform.h sshd.c openbsd-compat/Makefile.in]
2249 [openbsd-compat/openbsd-compat.h openbsd-compat/port-solaris.c]
2250 [openbsd-compat/port-solaris.h] Add support for Solaris process
2251 contracts, enabled with --use-solaris-contracts. Patch from Chad
2252 Mynhier, tweaked by dtucker@ and myself; ok dtucker@
77f7d474 2253 - (dtucker) [contrib/cygwin/ssh-host-config] Add SeTcbPrivilege privilege
2254 while setting up the ssh service account. Patch from Corinna Vinschen.
5b84789f 2255
e9f2e744 225620060830
2257 - (djm) OpenBSD CVS Sync
2258 - dtucker@cvs.openbsd.org 2006/08/21 08:14:01
2259 [sshd_config.5]
2260 Document HostbasedUsesNameFromPacketOnly. Corrections from jmc@,
2261 ok jmc@ djm@
5f047fbc 2262 - dtucker@cvs.openbsd.org 2006/08/21 08:15:57
2263 [sshd.8]
2264 Add more detail about what permissions are and aren't accepted for
2265 authorized_keys files. Corrections jmc@, ok djm@, "looks good" jmc@
0875ae22 2266 - djm@cvs.openbsd.org 2006/08/29 10:40:19
2267 [channels.c session.c]
2268 normalise some inconsistent (but harmless) NULL pointer checks
2269 spotted by the Stanford SATURN tool, via Isil Dillig;
2270 ok markus@ deraadt@
b4f8e1cb 2271 - dtucker@cvs.openbsd.org 2006/08/29 12:02:30
2272 [gss-genr.c]
2273 Work around a problem in Heimdal that occurs when KRB5CCNAME file is
2274 missing, by checking whether or not kerberos allocated us a context
2275 before attempting to free it. Patch from Simon Wilkinson, tested by
2276 biorn@, ok djm@
3223b72f 2277 - dtucker@cvs.openbsd.org 2006/08/30 00:06:51
2278 [sshconnect2.c]
2279 Fix regression where SSH2 banner is printed at loglevels ERROR and FATAL
2280 where previously it weren't. bz #1221, found by Dean Kopesky, ok djm@
76970201 2281 - djm@cvs.openbsd.org 2006/08/30 00:14:37
2282 [version.h]
2283 crank to 4.4
9d68c41d 2284 - (djm) [openbsd-compat/xcrypt.c] needs unistd.h
6545dd0b 2285 - (dtucker) [auth.c openbsd-compat/port-aix.c] Bug #1207: always call
2286 loginsuccess on AIX immediately after authentication to clear the failed
2287 login count. Previously this would only happen when an interactive
2288 session starts (ie when a pty is allocated) but this means that accounts
2289 that have primarily non-interactive sessions (eg scp's) may gradually
2290 accumulate enough failures to lock out an account. This change may have
2291 a side effect of creating two audit records, one with a tty of "ssh"
2292 corresponding to the authentication and one with the allocated pty per
2293 interactive session.
e9f2e744 2294
48a7de26 229520060824
2296 - (dtucker) [openbsd-compat/basename.c] Include errno.h.
8151aaa5 2297 - (dtucker) [openbsd-compat/bsd-misc.c] Add includes needed for select(2) on
2298 older systems.
ab26f490 2299 - (dtucker) [openbsd-compat/bsd-misc.c] Include <sys/select.h> for select(2)
2300 on POSIX systems.
6beea87c 2301 - (dtucker) [openbsd-compat/bsd-openpty.c] Include for ioctl(2).
e429fba8 2302 - (dtucker) [openbsd-compat/rresvport.c] Include <stdlib.h> for malloc.
f07855f7 2303 - (dtucker) [openbsd-compat/xmmap.c] Move #define HAVE_MMAP to prevent
2304 unused variable warning when we have a broken or missing mmap(2).
48a7de26 2305
c1a1c295 230620060822
2307 - (dtucker) [Makefile.in] Bug #1177: fix incorrect path for sshrc in
2308 Makefile. Patch from santhi.amirta at gmail, ok djm.
2309
9895d518 231020060820
2311 - (dtucker) [log.c] Move ifdef to prevent unused variable warning.
08fb8ce9 2312 - (dtucker) [configure.ac] Save $LIBS during PAM library tests and restore
2313 afterward. Removes the need to mangle $LIBS later to remove -lpam and -ldl.
a086f73b 2314 - (dtucker) [configure.ac] Relocate --with-pam parts in preparation for
2315 fixing bug #1181. No changes yet.
282d6408 2316 - (dtucker) [configure.ac] Bug #1181: Explicitly test to see if OpenSSL
2317 (0.9.8a and presumably newer) requires -ldl to successfully link.
08164407 2318 - (dtucker) [configure.ac] Remove errant "-".
9895d518 2319
94d458e8 232020060819
2321 - (djm) OpenBSD CVS Sync
2322 - djm@cvs.openbsd.org 2006/08/18 22:41:29
2323 [gss-genr.c]
2324 GSSAPI error code should be 0 and not -1; from simon@sxw.org.uk
ea83a498 2325 - (dtucker) [openbsd-compat/regress/Makefile.in] Add $(EXEEXT) and add a
2326 single rule for the test progs.
94d458e8 2327
795e7517 232820060818
2329 - (dtucker) [configure.ac openbsd-compat/bsd-closefrom.c] Resync with
2330 closefrom.c from sudo.
5a1d6300 2331 - (dtucker) [openbsd-compat/bsd-closefrom.c] Comment out rcsid.
fed313fd 2332 - (dtucker) [openbsd-compat/regress/snprintftest.c] Newline on error.
d5498c58 2333 - (dtucker) [openbsd-compat/regress/Makefile.in] Use implicit rules for the
2334 test progs instead; they work better than what we have.
78372b6e 2335 - (djm) OpenBSD CVS Sync
2336 - stevesk@cvs.openbsd.org 2006/08/06 01:13:32
2337 [compress.c monitor.c monitor_wrap.c]
2338 "zlib.h" can be <zlib.h>; ok djm@ markus@
ba52fb56 2339 - miod@cvs.openbsd.org 2006/08/12 20:46:46
2340 [monitor.c monitor_wrap.c]
2341 Revert previous include file ordering change, for ssh to compile under
2342 gcc2 (or until openssl include files are cleaned of parameter names
2343 in function prototypes)
fa47fe3c 2344 - dtucker@cvs.openbsd.org 2006/08/14 12:40:25
2345 [servconf.c servconf.h sshd_config.5]
2346 Add ability to match groups to Match keyword in sshd_config. Feedback
2347 djm@, stevesk@, ok stevesk@.
e07335e2 2348 - djm@cvs.openbsd.org 2006/08/16 11:47:15
2349 [sshd.c]
2350 factor inetd connection, TCP listen and main TCP accept loop out of
2351 main() into separate functions to improve readability; ok markus@
28463427 2352 - deraadt@cvs.openbsd.org 2006/08/18 09:13:26
2353 [log.c log.h sshd.c]
2354 make signal handler termination path shorter; risky code pointed out by
2355 mark dowd; ok djm markus
184cb418 2356 - markus@cvs.openbsd.org 2006/08/18 09:15:20
2357 [auth.h session.c sshd.c]
2358 delay authentication related cleanups until we're authenticated and
2359 all alarms have been cancelled; ok deraadt
b2af4ca8 2360 - djm@cvs.openbsd.org 2006/08/18 10:27:16
2361 [misc.h]
2362 reorder so prototypes are sorted by the files they refer to; no
2363 binary change
592de384 2364 - djm@cvs.openbsd.org 2006/08/18 13:54:54
2365 [gss-genr.c ssh-gss.h sshconnect2.c]
2366 bz #1218 - disable SPNEGO as per RFC4462; diff from simon AT sxw.org.uk
2367 ok markus@
abb47f1e 2368 - djm@cvs.openbsd.org 2006/08/18 14:40:34
2369 [gss-genr.c ssh-gss.h]
2370 constify host argument to match the rest of the GSSAPI functions and
2371 unbreak compilation with -Werror
c79c4814 2372 - (djm) Disable sigdie() for platforms that cannot safely syslog inside
2373 a signal handler (basically all of them, excepting OpenBSD);
2374 ok dtucker@
795e7517 2375
f8688ddd 237620060817
2377 - (dtucker) [openbsd-compat/fake-rfc2553.c openbsd-compat/setproctitle.c]
2378 Include stdlib.h for malloc and friends.
53c337ed 2379 - (dtucker) [configure.ac openbsd-compat/bsd-closefrom.c] Use F_CLOSEM fcntl
2380 for closefrom() on AIX. Pointed out by William Ahern.
98cc66aa 2381 - (dtucker) [openbsd-compat/regress/{Makefile.in,closefromtest.c}] Regress
2382 test for closefrom() in compat code.
f8688ddd 2383
5388904a 238420060816
2385 - (djm) [audit-bsm.c] Sprinkle in some headers
2386
4a86d8eb 238720060815
2388 - (dtucker) [LICENCE] Add Reyk to the list for the compat dir.
2389
3a5b6088 239020060806
2391 - (djm) [openbsd-compat/bsd-getpeereid.c] Add some headers to quiet warnings
2392 on Solaris 10
2393
239420060806
149abacb 2395 - (dtucker) [defines.h] With the includes.h changes we no longer get the
2396 name clash on "YES" so we can remove the workaround for it.
442a6515 2397 - (dtucker) [openbsd-compat/{bsd-asprintf.c,bsd-openpty.c,bsd-snprintf.c,
2398 glob.c}] Include stdlib.h for malloc and friends in compat code.
149abacb 2399
fee76795 240020060805
2401 - (djm) OpenBSD CVS Sync
2402 - stevesk@cvs.openbsd.org 2006/07/24 13:58:22
2403 [sshconnect.c]
2404 disable tunnel forwarding when no strict host key checking
2405 and key changed; ok djm@ markus@ dtucker@
912da635 2406 - stevesk@cvs.openbsd.org 2006/07/25 02:01:34
2407 [scard.c]
2408 need #include <string.h>
e264ac72 2409 - stevesk@cvs.openbsd.org 2006/07/25 02:59:21
2410 [channels.c clientloop.c packet.c scp.c serverloop.c sftp-client.c]
2411 [sftp-server.c ssh-agent.c ssh-keyscan.c sshconnect.c sshd.c]
2412 move #include <sys/time.h> out of includes.h
536c14e8 2413 - stevesk@cvs.openbsd.org 2006/07/26 02:35:17
2414 [atomicio.c auth.c dh.c authfile.c buffer.c clientloop.c kex.c]
2415 [groupaccess.c gss-genr.c kexgexs.c misc.c monitor.c monitor_mm.c]
2416 [packet.c scp.c serverloop.c session.c sftp-client.c sftp-common.c]
2417 [sftp-server.c sftp.c ssh-add.c ssh-agent.c ssh-keygen.c sshlogin.c]
2418 [uidswap.c xmalloc.c]
2419 move #include <sys/param.h> out of includes.h
ffa517a8 2420 - stevesk@cvs.openbsd.org 2006/07/26 13:57:17
2421 [authfd.c authfile.c dh.c canohost.c channels.c clientloop.c compat.c]
2422 [hostfile.c kex.c log.c misc.c moduli.c monitor.c packet.c readpass.c]
2423 [scp.c servconf.c session.c sftp-server.c sftp.c ssh-add.c ssh-agent.c]
2424 [ssh-keygen.c ssh-keyscan.c ssh-keysign.c ssh.c sshconnect.c]
2425 [sshconnect1.c sshd.c xmalloc.c]
2426 move #include <stdlib.h> out of includes.h
f0817fbb 2427 - jmc@cvs.openbsd.org 2006/07/27 08:00:50
2428 [ssh_config.5]
2429 avoid confusing wording in HashKnownHosts:
2430 originally spotted by alan amesbury;
2431 ok deraadt
38b37661 2432 - jmc@cvs.openbsd.org 2006/07/27 08:00:50
2433 [ssh_config.5]
2434 avoid confusing wording in HashKnownHosts:
2435 originally spotted by alan amesbury;
2436 ok deraadt
331c3884 2437 - dtucker@cvs.openbsd.org 2006/08/01 11:34:36
2438 [sshconnect.c]
2439 Allow fallback to known_hosts entries without port qualifiers for
2440 non-standard ports too, so that all existing known_hosts entries will be
2441 recognised. Requested by, feedback and ok markus@
cf851879 2442 - stevesk@cvs.openbsd.org 2006/08/01 23:22:48
2443 [auth-passwd.c auth-rhosts.c auth-rsa.c auth.c auth.h auth1.c]
2444 [auth2-chall.c auth2-pubkey.c authfile.c buffer.c canohost.c]
2445 [channels.c clientloop.c dh.c dns.c dns.h hostfile.c kex.c kexdhc.c]
2446 [kexgexc.c kexgexs.c key.c key.h log.c misc.c misc.h moduli.c]
2447 [monitor_wrap.c packet.c progressmeter.c readconf.c readpass.c scp.c]
2448 [servconf.c session.c sftp-client.c sftp-common.c sftp-server.c sftp.c]
2449 [ssh-add.c ssh-agent.c ssh-keygen.c ssh-keyscan.c ssh.c sshconnect.c]
2450 [sshconnect1.c sshconnect2.c sshd.c sshlogin.c sshtty.c uuencode.c]
2451 [uuencode.h xmalloc.c]
2452 move #include <stdio.h> out of includes.h
d4f40d92 2453 - stevesk@cvs.openbsd.org 2006/08/01 23:36:12
2454 [authfile.c channels.c progressmeter.c scard.c servconf.c ssh.c]
2455 clean extra spaces
31652869 2456 - deraadt@cvs.openbsd.org 2006/08/03 03:34:42
2457 [OVERVIEW atomicio.c atomicio.h auth-bsdauth.c auth-chall.c auth-krb5.c]
2458 [auth-options.c auth-options.h auth-passwd.c auth-rh-rsa.c auth-rhosts.c]
2459 [auth-rsa.c auth-skey.c auth.c auth.h auth1.c auth2-chall.c auth2-gss.c]
2460 [auth2-hostbased.c auth2-kbdint.c auth2-none.c auth2-passwd.c ]
2461 [auth2-pubkey.c auth2.c authfd.c authfd.h authfile.c bufaux.c bufbn.c]
2462 [buffer.c buffer.h canohost.c channels.c channels.h cipher-3des1.c]
2463 [cipher-bf1.c cipher-ctr.c cipher.c cleanup.c clientloop.c compat.c]
2464 [compress.c deattack.c dh.c dispatch.c dns.c dns.h fatal.c groupaccess.c]
2465 [groupaccess.h gss-genr.c gss-serv-krb5.c gss-serv.c hostfile.c kex.c]
2466 [kex.h kexdh.c kexdhc.c kexdhs.c kexgex.c kexgexc.c kexgexs.c key.c]
2467 [key.h log.c log.h mac.c match.c md-sha256.c misc.c misc.h moduli.c]
2468 [monitor.c monitor_fdpass.c monitor_mm.c monitor_mm.h monitor_wrap.c]
2469 [monitor_wrap.h msg.c nchan.c packet.c progressmeter.c readconf.c]
2470 [readconf.h readpass.c rsa.c scard.c scard.h scp.c servconf.c servconf.h]
2471 [serverloop.c session.c session.h sftp-client.c sftp-common.c]
2472 [sftp-common.h sftp-glob.c sftp-server.c sftp.c ssh-add.c ssh-agent.c]
2473 [ssh-dss.c ssh-gss.h ssh-keygen.c ssh-keyscan.c ssh-keysign.c ssh-rsa.c]
2474 [ssh.c ssh.h sshconnect.c sshconnect.h sshconnect1.c sshconnect2.c]
2475 [sshd.c sshlogin.c sshlogin.h sshpty.c sshpty.h sshtty.c ttymodes.c]
2476 [uidswap.c uidswap.h uuencode.c uuencode.h xmalloc.c xmalloc.h]
2477 [loginrec.c loginrec.h openbsd-compat/port-aix.c openbsd-compat/port-tun.h]
2478 almost entirely get rid of the culture of ".h files that include .h files"
2479 ok djm, sort of ok stevesk
2480 makes the pain stop in one easy step
2481 NB. portable commit contains everything *except* removing includes.h, as
2482 that will take a fair bit more work as we move headers that are required
2483 for portability workarounds to defines.h. (also, this step wasn't "easy")
c56969f9 2484 - stevesk@cvs.openbsd.org 2006/08/04 20:46:05
2485 [monitor.c session.c ssh-agent.c]
2486 spaces
8bdc7aa0 2487 - (djm) [auth-pam.c defines.h] Move PAM related bits to auth-pam.c
693a35d3 2488 - (djm) [auth-pam.c auth.c bufaux.h entropy.c openbsd-compat/port-tun.c]
2489 remove last traces of bufaux.h - it was merged into buffer.h in the big
2490 includes.h commit
8ad2db2a 2491 - (djm) [auth.c loginrec.c] Missing netinet/in.h for loginrec
8d3106fd 2492 - (djm) [openbsd-compat/regress/snprintftest.c]
2493 [openbsd-compat/regress/strduptest.c] Add missing includes so they pass
2494 compilation with "-Wall -Werror"
00a017bd 2495 - (djm) [auth-pam.c auth-shadow.c auth2-none.c cleanup.c sshd.c]
2496 [openbsd-compat/port-tun.c openbsd-compat/port-tun.h] Sprinkle more
2497 includes for Linux in
ccc09f5c 2498 - (dtucker) [cleanup.c] Need defines.h for __dead.
9ae6b834 2499 - (dtucker) [auth2-gss.c] We still need the #ifdef GSSAPI in -portable.
f2265d5d 2500 - (dtucker) [openbsd-compat/{bsd-arc4random.c,port-tun.c,xmmap.c}] Lots of
2501 #include stdarg.h, needed for log.h.
5be9f803 2502 - (dtucker) [entropy.c] Needs unistd.h too.
35d1c2de 2503 - (dtucker) [ssh-rand-helper.c] Needs stdarg.h for log.h.
76e03684 2504 - (dtucker) [openbsd-compat/getrrsetbyname.c] Nees stdlib.h for malloc.
5946a69f 2505 - (dtucker) [openbsd-compat/strtonum.c] Include stdlib.h for strtoll,
2506 otherwise it is implicitly declared as returning an int.
428f6258 2507 - (dtucker) OpenBSD CVS Sync
2508 - dtucker@cvs.openbsd.org 2006/08/05 07:52:52
2509 [auth2-none.c sshd.c monitor_wrap.c]
2510 Add headers required to build with KERBEROS5=no. ok djm@
453cb7e7 2511 - dtucker@cvs.openbsd.org 2006/08/05 08:00:33
2512 [auth-skey.c]
2513 Add headers required to build with -DSKEY. ok djm@
cecc422f 2514 - dtucker@cvs.openbsd.org 2006/08/05 08:28:24
2515 [monitor_wrap.c auth-skey.c auth2-chall.c]
2516 Zap unused variables in -DSKEY code. ok djm@
0e13ec0f 2517 - dtucker@cvs.openbsd.org 2006/08/05 08:34:04
2518 [packet.c]
2519 Typo in comment
97ea266c 2520 - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Add headers required to compile
2521 on Cygwin.
e3220bb2 2522 - (dtucker) [openbsd-compat/fake-rfc2553.c] Add headers needed for inet_ntoa.
f3296bc4 2523 - (dtucker) [auth-skey.c] monitor_wrap.h needs ssh-gss.h.
0e23dc86 2524 - (dtucker) [audit.c audit.h] Repair headers.
6f54ce27 2525 - (dtucker) [audit-bsm.c] Add additional headers now required.
fee76795 2526
3e05aa50 252720060804
2528 - (dtucker) [configure.ac] The "crippled AES" test does not work on recent
2529 versions of Solaris, so use AC_LINK_IFELSE to actually link the test program
2530 rather than just compiling it. Spotted by dlg@.
2531
53d4ae20 253220060802
2533 - (dtucker) [openbsd-compat/daemon.c] Add unistd.h for fork() prototype.
2534
be350da6 253520060725
2536 - (dtucker) [openbsd-compat/xmmap.c] Need fcntl.h for O_RDRW.
2537
14e980ef 253820060724
2539 - (djm) OpenBSD CVS Sync
2540 - jmc@cvs.openbsd.org 2006/07/12 13:39:55
2541 [sshd_config.5]
2542 - new sentence, new line
2543 - s/The the/The/
2544 - kill a bad comma
c8dfff33 2545 - stevesk@cvs.openbsd.org 2006/07/12 22:28:52
742bee8c 2546 [auth-options.c canohost.c channels.c includes.h readconf.c]
2547 [servconf.c ssh-keyscan.c ssh.c sshconnect.c sshd.c]
c8dfff33 2548 move #include <netdb.h> out of includes.h; ok djm@
bcaab305 2549 - stevesk@cvs.openbsd.org 2006/07/12 22:42:32
2550 [includes.h ssh.c ssh-rand-helper.c]
2551 move #include <stddef.h> out of includes.h
d2a69816 2552 - stevesk@cvs.openbsd.org 2006/07/14 01:15:28
2553 [monitor_wrap.h]
2554 don't need incompletely-typed 'struct passwd' now with
2555 #include <pwd.h>; ok markus@
5188ba17 2556 - stevesk@cvs.openbsd.org 2006/07/17 01:31:10
2557 [authfd.c authfile.c channels.c cleanup.c clientloop.c groupaccess.c]
2558 [includes.h log.c misc.c msg.c packet.c progressmeter.c readconf.c]
2559 [readpass.c scp.c servconf.c sftp-client.c sftp-server.c sftp.c]
2560 [ssh-add.c ssh-agent.c ssh-keygen.c ssh-keyscan.c ssh-keysign.c ssh.c]
2561 [sshconnect.c sshlogin.c sshpty.c uidswap.c]
2562 move #include <unistd.h> out of includes.h
774de098 2563 - dtucker@cvs.openbsd.org 2006/07/17 12:02:24
2564 [auth-options.c]
2565 Use '\0' rather than 0 to terminates strings; ok djm@
2fefbadf 2566 - dtucker@cvs.openbsd.org 2006/07/17 12:06:00
2567 [channels.c channels.h servconf.c sshd_config.5]
2568 Add PermitOpen directive to sshd_config which is equivalent to the
2569 "permitopen" key option. Allows server admin to allow TCP port
2570 forwarding only two specific host/port pairs. Useful when combined
2571 with Match.
2572 If permitopen is used in both sshd_config and a key option, both
2573 must allow a given connection before it will be permitted.
2574 Note that users can still use external forwarders such as netcat,
2575 so to be those must be controlled too for the limits to be effective.
2576 Feedback & ok djm@, man page corrections & ok jmc@.
f22506ff 2577 - jmc@cvs.openbsd.org 2006/07/18 07:50:40
2578 [sshd_config.5]
2579 tweak; ok dtucker
578d2b99 2580 - jmc@cvs.openbsd.org 2006/07/18 07:56:28
2581 [scp.1]
2582 replace DIAGNOSTICS with .Ex;
874d319b 2583 - jmc@cvs.openbsd.org 2006/07/18 08:03:09
2584 [ssh-agent.1 sshd_config.5]
2585 mark up angle brackets;
4895f836 2586 - dtucker@cvs.openbsd.org 2006/07/18 08:22:23
2587 [sshd_config.5]
2588 Clarify description of Match, with minor correction from jmc@
62e12ffe 2589 - stevesk@cvs.openbsd.org 2006/07/18 22:27:55
2590 [dh.c]
2591 remove unneeded includes; ok djm@
691712e0 2592 - dtucker@cvs.openbsd.org 2006/07/19 08:56:41
2593 [servconf.c sshd_config.5]
2594 Add support for X11Forwaring, X11DisplayOffset and X11UseLocalhost to
2595 Match. ok djm@
e7259e8d 2596 - dtucker@cvs.openbsd.org 2006/07/19 13:07:10
2597 [servconf.c servconf.h session.c sshd.8 sshd_config sshd_config.5]
2598 Add ForceCommand keyword to sshd_config, equivalent to the "command="
2599 key option, man page entry and example in sshd_config.
2600 Feedback & ok djm@, man page corrections & ok jmc@
67514848 2601 - stevesk@cvs.openbsd.org 2006/07/20 15:26:15
2602 [auth1.c serverloop.c session.c sshconnect2.c]
2603 missed some needed #include <unistd.h> when KERBEROS5=no; issue from
2604 massimo@cedoc.mo.it
ea46e550 2605 - dtucker@cvs.openbsd.org 2006/07/21 12:43:36
2606 [channels.c channels.h servconf.c servconf.h sshd_config.5]
2607 Make PermitOpen take a list of permitted ports and act more like most
2608 other keywords (ie the first match is the effective setting). This
2609 also makes it easier to override a previously set PermitOpen. ok djm@
ebb90778 2610 - stevesk@cvs.openbsd.org 2006/07/21 21:13:30
2611 [channels.c]
2612 more ARGSUSED (lint) for dispatch table-driven functions; ok djm@
c88c3fb9 2613 - stevesk@cvs.openbsd.org 2006/07/21 21:26:55
2614 [progressmeter.c]
2615 ARGSUSED for signal handler
b0f6943a 2616 - stevesk@cvs.openbsd.org 2006/07/22 19:08:54
2617 [includes.h moduli.c progressmeter.c scp.c sftp-common.c]
2618 [sftp-server.c ssh-agent.c sshlogin.c]
2619 move #include <time.h> out of includes.h
00146caa 2620 - stevesk@cvs.openbsd.org 2006/07/22 20:48:23
2621 [atomicio.c auth-options.c auth-passwd.c auth-rhosts.c auth-rsa.c]
2622 [auth.c auth1.c auth2-chall.c auth2-hostbased.c auth2-passwd.c auth2.c]
2623 [authfd.c authfile.c bufaux.c bufbn.c buffer.c canohost.c channels.c]
2624 [cipher-3des1.c cipher-bf1.c cipher-ctr.c cipher.c clientloop.c]
2625 [compat.c deattack.c dh.c dns.c gss-genr.c gss-serv.c hostfile.c]
2626 [includes.h kex.c kexdhc.c kexdhs.c kexgexc.c kexgexs.c key.c log.c]
2627 [mac.c match.c md-sha256.c misc.c moduli.c monitor.c monitor_fdpass.c]
2628 [monitor_mm.c monitor_wrap.c msg.c nchan.c packet.c rsa.c]
2629 [progressmeter.c readconf.c readpass.c scp.c servconf.c serverloop.c]
2630 [session.c sftp-client.c sftp-common.c sftp-glob.c sftp-server.c sftp.c]
2631 [ssh-add.c ssh-agent.c ssh-dss.c ssh-keygen.c ssh-keyscan.c]
2632 [ssh-keysign.c ssh-rsa.c ssh.c sshconnect.c sshconnect1.c sshconnect2.c]
2633 [sshd.c sshlogin.c sshpty.c ttymodes.c uidswap.c xmalloc.c]
2634 move #include <string.h> out of includes.h
519fc2b7 2635 - stevesk@cvs.openbsd.org 2006/07/23 01:11:05
2636 [auth.h dispatch.c kex.h sftp-client.c]
2637 #include <signal.h> for sig_atomic_t; need this prior to <sys/param.h>
2638 move
28cb0a43 2639 - (djm) [acss.c auth-krb5.c auth-options.c auth-pam.c auth-shadow.c]
2640 [canohost.c channels.c cipher-acss.c defines.h dns.c gss-genr.c]
2641 [gss-serv-krb5.c gss-serv.c log.h loginrec.c logintest.c readconf.c]
2642 [servconf.c ssh-keygen.c ssh-keyscan.c ssh-keysign.c ssh-rand-helper.c]
2643 [ssh.c sshconnect.c sshd.c openbsd-compat/bindresvport.c]
2644 [openbsd-compat/bsd-arc4random.c openbsd-compat/bsd-misc.c]
2645 [openbsd-compat/getrrsetbyname.c openbsd-compat/glob.c]
2646 [openbsd-compat/mktemp.c openbsd-compat/port-linux.c]
2647 [openbsd-compat/port-tun.c openbsd-compat/readpassphrase.c]
2648 [openbsd-compat/setproctitle.c openbsd-compat/xmmap.c]
2649 make the portable tree compile again - sprinkle unistd.h and string.h
2650 back in. Don't redefine __unused, as it turned out to be used in
2651 headers on Linux, and replace its use in auth-pam.c with ARGSUSED
ba1e6121 2652 - (djm) [openbsd-compat/glob.c]
2653 Move get_arg_max() into the ifdef HAVE_GLOB block so that it compiles
2654 on OpenBSD (or other platforms with a decent glob implementation) with
2655 -Werror
25523747 2656 - (djm) [uuencode.c]
2657 Add resolv.h, is it contains the prototypes for __b64_ntop/__b64_pton on
2658 some platforms
9b09381d 2659 - (djm) [session.c]
2660 fix compile error with -Werror -Wall: 'path' is only used in
2661 do_setup_env() if HAVE_LOGIN_CAP is not defined
e204f3ee 2662 - (djm) [openbsd-compat/basename.c openbsd-compat/bsd-closefrom.c]
2663 [openbsd-compat/bsd-cray.c openbsd-compat/bsd-openpty.c]
2664 [openbsd-compat/bsd-snprintf.c openbsd-compat/fake-rfc2553.c]
2665 [openbsd-compat/port-aix.c openbsd-compat/port-irix.c]
2666 [openbsd-compat/rresvport.c]
2667 These look to need string.h and/or unistd.h (based on a grep for function
2668 names)
f40c8634 2669 - (djm) [Makefile.in]
2670 Remove generated openbsd-compat/regress/Makefile in distclean target
e7c5b206 2671 - (djm) [regress/Makefile regress/agent-getpeereid.sh regress/cfgmatch.sh]
2672 [regress/cipher-speed.sh regress/forcecommand.sh regress/forwarding.sh]
2673 Sync regress tests to -current; include dtucker@'s new cfgmatch and
2674 forcecommand tests. Add cipher-speed.sh test (not linked in yet)
30872a12 2675 - (dtucker) [cleanup.c] Since config.h defines _LARGE_FILES on AIX, including
2676 system headers before defines.h will cause conflicting definitions.
b64d983b 2677 - (dtucker) [regress/forcecommand.sh] Portablize.
e204f3ee 2678
4352744e 267920060713
2680 - (dtucker) [auth-krb5.c auth-pam.c] Still more errno.h
2681
956d6743 268220060712
294d3ca5 2683 - (dtucker) [configure.ac defines.h] Only define SHUT_RD (and friends) and
2684 O_NONBLOCK if they're really needed. Fixes build errors on HP-UX, old
2685 Linuxes and probably more.
71f4c727 2686 - (dtucker) [configure.ac] OpenBSD needs <sys/types.h> before <sys/socket.h>
2687 for SHUT_RD.
f9d5c000 2688 - (dtucker) [openbsd-compat/port-tun.c] OpenBSD needs <netinet/in.h> before
2689 <netinet/ip.h>.
a773acf7 2690 - (dtucker) OpenBSD CVS Sync
2691 - stevesk@cvs.openbsd.org 2006/07/10 16:01:57
2692 [sftp-glob.c sftp-common.h sftp.c]
2693 buffer.h only needed in sftp-common.h and remove some unneeded
2694 user includes; ok djm@
a0bca6ed 2695 - jmc@cvs.openbsd.org 2006/07/10 16:04:21
2696 [sshd.8]
2697 s/and and/and/
4c72fcfd 2698 - stevesk@cvs.openbsd.org 2006/07/10 16:37:36
2699 [readpass.c log.h scp.c fatal.c xmalloc.c includes.h ssh-keyscan.c misc.c
2700 auth.c packet.c log.c]
2701 move #include <stdarg.h> out of includes.h; ok markus@
0ad62016 2702 - dtucker@cvs.openbsd.org 2006/07/11 10:12:07
2703 [ssh.c]
2704 Only copy the part of environment variable that we actually use. Prevents
2705 ssh bailing when SendEnv is used and an environment variable with a really
2706 long value exists. ok djm@
42ea6f5e 2707 - markus@cvs.openbsd.org 2006/07/11 18:50:48
2708 [clientloop.c ssh.1 ssh.c channels.c ssh_config.5 readconf.h session.c
2709 channels.h readconf.c]
2710 add ExitOnForwardFailure: terminate the connection if ssh(1)
2711 cannot set up all requested dynamic, local, and remote port
2712 forwardings. ok djm, dtucker, stevesk, jmc
028094f4 2713 - stevesk@cvs.openbsd.org 2006/07/11 20:07:25
2714 [scp.c auth.c monitor.c serverloop.c sftp-server.c sshpty.c readpass.c
2715 sshd.c monitor_wrap.c monitor_fdpass.c ssh-agent.c ttymodes.c atomicio.c
2716 includes.h session.c sshlogin.c monitor_mm.c packet.c sshconnect2.c
2717 sftp-client.c nchan.c clientloop.c sftp.c misc.c canohost.c channels.c
2718 ssh-keygen.c progressmeter.c uidswap.c msg.c readconf.c sshconnect.c]
2719 move #include <errno.h> out of includes.h; ok markus@
00c8971b 2720 - stevesk@cvs.openbsd.org 2006/07/11 20:16:43
2721 [ssh.c]
2722 cast asterisk field precision argument to int to remove warning;
2723 ok markus@
dd984467 2724 - stevesk@cvs.openbsd.org 2006/07/11 20:27:56
2725 [authfile.c ssh.c]
2726 need <errno.h> here also (it's also included in <openssl/err.h>)
d231781a 2727 - dtucker@cvs.openbsd.org 2006/07/12 11:34:58
2728 [sshd.c servconf.h servconf.c sshd_config.5 auth.c]
2729 Add support for conditional directives to sshd_config via a "Match"
2730 keyword, which works similarly to the "Host" directive in ssh_config.
2731 Lines after a Match line override the default set in the main section
2732 if the condition on the Match line is true, eg
2733 AllowTcpForwarding yes
2734 Match User anoncvs
2735 AllowTcpForwarding no
2736 will allow port forwarding by all users except "anoncvs".
2737 Currently only a very small subset of directives are supported.
2738 ok djm@
fec71b2f 2739 - (dtucker) [loginrec.c openbsd-compat/xmmap.c openbsd-compat/bindresvport.c
2740 openbsd-compat/glob.c openbsd-compat/mktemp.c openbsd-compat/port-tun.c
2741 openbsd-compat/readpassphrase.c openbsd-compat/strtonum.c] Include <errno.h>.
baede55a 2742 - (dtucker) [openbsd-compat/setproctitle.c] Include stdarg.h.
403a29ac 2743 - (dtucker) [ssh-keyscan.c ssh-rand-helper.c] More errno.h here too.
5f8747dc 2744 - (dtucker) [openbsd-compat/openbsd-compat.h] v*printf needs stdarg.h.
4f4b7d4d 2745 - (dtucker) [openbsd-compat/bsd-asprintf.c openbsd-compat/port-aix.c
2746 openbsd-compat/rresvport.c] More errno.h.
2747
37259a8e 274820060711
2749 - (dtucker) [configure.ac ssh-keygen.c openbsd-compat/bsd-openpty.c
2750 openbsd-compat/daemon.c] Add includes needed by open(2). Conditionally
2751 include paths.h. Fixes build error on Solaris.
2edd133e 2752 - (dtucker) [entropy.c] More fcntl.h, this time on AIX (and probably
2753 others).
37259a8e 2754
44064ac4 275520060710
2756 - (dtucker) [INSTALL] New autoconf version: 2.60.
e5c76324 2757 - OpenBSD CVS Sync
2758 - djm@cvs.openbsd.org 2006/06/14 10:50:42
2759 [sshconnect.c]
2760 limit the number of pre-banner characters we will accept; ok markus@
9f1090be 2761 - djm@cvs.openbsd.org 2006/06/26 10:36:15
2762 [clientloop.c]
2763 mention optional bind_address in runtime port forwarding setup
2764 command-line help. patch from santhi.amirta AT gmail.com
06fa4ac1 2765 - stevesk@cvs.openbsd.org 2006/07/02 17:12:58
2766 [ssh.1 ssh.c ssh_config.5 sshd_config.5]
2767 more details and clarity for tun(4) device forwarding; ok and help
2768 jmc@
6955279c 2769 - stevesk@cvs.openbsd.org 2006/07/02 18:36:47
2770 [gss-serv-krb5.c gss-serv.c]
2771 no "servconf.h" needed here
2772 (gss-serv-krb5.c change not applied, portable needs the server options)
16fbe330 2773 - stevesk@cvs.openbsd.org 2006/07/02 22:45:59
2774 [groupaccess.c groupaccess.h includes.h session.c sftp-common.c sshpty.c]
2775 move #include <grp.h> out of includes.h
2776 (portable needed uidswap.c too)
33f13fa5 2777 - stevesk@cvs.openbsd.org 2006/07/02 23:01:55
2778 [clientloop.c ssh.1]
2779 use -KR[bind_address:]port here; ok djm@
28015df4 2780 - stevesk@cvs.openbsd.org 2006/07/03 08:54:20
2781 [includes.h ssh.c sshconnect.c sshd.c]
2782 move #include "version.h" out of includes.h; ok markus@
319d6b41 2783 - stevesk@cvs.openbsd.org 2006/07/03 17:59:32
2784 [channels.c includes.h]
2785 move #include <arpa/inet.h> out of includes.h; old ok djm@
2786 (portable needed session.c too)
9794d008 2787 - stevesk@cvs.openbsd.org 2006/07/05 02:42:09
2788 [canohost.c hostfile.c includes.h misc.c packet.c readconf.c]
2789 [serverloop.c sshconnect.c uuencode.c]
2790 move #include <netinet/in.h> out of includes.h; ok deraadt@
2791 (also ssh-rand-helper.c logintest.c loginrec.c)
d66ce1a1 2792 - djm@cvs.openbsd.org 2006/07/06 10:47:05
2793 [servconf.c servconf.h session.c sshd_config.5]
2794 support arguments to Subsystem commands; ok markus@
a13880bb 2795 - djm@cvs.openbsd.org 2006/07/06 10:47:57
2796 [sftp-server.8 sftp-server.c]
2797 add commandline options to enable logging of transactions; ok markus@
b1842393 2798 - stevesk@cvs.openbsd.org 2006/07/06 16:03:53
2799 [auth-options.c auth-options.h auth-passwd.c auth-rh-rsa.c]
2800 [auth-rhosts.c auth-rsa.c auth.c auth.h auth2-hostbased.c]
2801 [auth2-pubkey.c auth2.c includes.h misc.c misc.h monitor.c]
2802 [monitor_wrap.c monitor_wrap.h scp.c serverloop.c session.c]
2803 [session.h sftp-common.c ssh-add.c ssh-keygen.c ssh-keysign.c]
2804 [ssh.c sshconnect.c sshconnect.h sshd.c sshpty.c sshpty.h uidswap.c]
2805 [uidswap.h]
2806 move #include <pwd.h> out of includes.h; ok markus@
0cbe25f0 2807 - stevesk@cvs.openbsd.org 2006/07/06 16:22:39
2808 [ssh-keygen.c]
2809 move #include "dns.h" up
76275092 2810 - stevesk@cvs.openbsd.org 2006/07/06 17:36:37
2811 [monitor_wrap.h]
2812 typo in comment
5b04a8bf 2813 - stevesk@cvs.openbsd.org 2006/07/08 21:47:12
2814 [authfd.c canohost.c clientloop.c dns.c dns.h includes.h]
2815 [monitor_fdpass.c nchan.c packet.c servconf.c sftp.c ssh-agent.c]
2816 [ssh-keyscan.c ssh.c sshconnect.h sshd.c sshlogin.h]
2817 move #include <sys/socket.h> out of includes.h
9305512d 2818 - stevesk@cvs.openbsd.org 2006/07/08 21:48:53
2819 [monitor.c session.c]
2820 missed these from last commit:
2821 move #include <sys/socket.h> out of includes.h
ca1df159 2822 - stevesk@cvs.openbsd.org 2006/07/08 23:30:06
2823 [log.c]
2824 move user includes after /usr/include files
d3221cca 2825 - stevesk@cvs.openbsd.org 2006/07/09 15:15:11
2826 [auth2-none.c authfd.c authfile.c includes.h misc.c monitor.c]
2827 [readpass.c scp.c serverloop.c sftp-client.c sftp-server.c]
2828 [ssh-add.c ssh-agent.c ssh-keygen.c ssh-keysign.c ssh.c sshd.c]
2829 [sshlogin.c sshpty.c]
2830 move #include <fcntl.h> out of includes.h
657939aa 2831 - stevesk@cvs.openbsd.org 2006/07/09 15:27:59
2832 [ssh-add.c]
2833 use O_RDONLY vs. 0 in open(); no binary change
43bc2dc9 2834 - djm@cvs.openbsd.org 2006/07/10 11:24:54
2835 [sftp-server.c]
2836 remove optind - it isn't used here
26ddd377 2837 - djm@cvs.openbsd.org 2006/07/10 11:25:53
2838 [sftp-server.c]
2839 don't log variables that aren't yet set
22bbb3e6 2840 - (djm) [loginrec.c ssh-rand-helper.c sshd.c openbsd-compat/glob.c]
2841 [openbsd-compat/mktemp.c openbsd-compat/openbsd-compat.h]
2842 [openbsd-compat/port-tun.c openbsd-compat/readpassphrase.c]
2843 [openbsd-compat/xcrypt.c] Fix includes.h fallout, mainly fcntl.h
1879b184 2844 - OpenBSD CVS Sync
2845 - djm@cvs.openbsd.org 2006/07/10 12:03:20
2846 [scp.c]
2847 duplicate argv at the start of main() because it gets modified later;
2848 pointed out by deraadt@ ok markus@
a217e418 2849 - djm@cvs.openbsd.org 2006/07/10 12:08:08
2850 [channels.c]
2851 fix misparsing of SOCKS 5 packets that could result in a crash;
2852 reported by mk@ ok markus@
d4530052 2853 - dtucker@cvs.openbsd.org 2006/07/10 12:46:51
2854 [misc.c misc.h sshd.8 sshconnect.c]
2855 Add port identifier to known_hosts for non-default ports, based originally
2856 on a patch from Devin Nate in bz#910.
2857 For any connection using the default port or using a HostKeyAlias the
2858 format is unchanged, otherwise the host name or address is enclosed
2859 within square brackets in the same format as sshd's ListenAddress.
2860 Tested by many, ok markus@.
9b6edf98 2861 - (dtucker) [openbsd-compat/openbsd-compat.h] Need to include <sys/socket.h>
2862 for struct sockaddr on platforms that use the fake-rfc stuff.
44064ac4 2863
e7479666 286420060706
2865 - (dtucker) [configure.ac] Try AIX blibpath test in different order when
2866 compiling with gcc. gcc 4.1.x will accept (but ignore) -b flags so
2867 configure would not select the correct libpath linker flags.
90f321a4 2868 - (dtucker) [INSTALL] A bit more info on autoconf.
e7479666 2869
e5c27607 287020060705
2871 - (dtucker) [ssh-rand-helper.c] Don't exit if mkdir fails because the
2872 target already exists.
2873
202c6095 287420060630
2875 - (dtucker) [openbsd-compat/openbsd-compat.h] SNPRINTF_CONST for snprintf
2876 declaration too. Patch from russ at sludge.net.
0bbb4f75 2877 - (dtucker) [openbsd-compat/getrrsetbyname.c] Undef _res before defining it,
2878 prevents warnings on platforms where _res is in the system headers.
10f1064f 2879 - (dtucker) [INSTALL] Bug #1202: Note when autoconf is required and which
2880 version.
202c6095 2881
ecd9ec09 288220060627
2883 - (dtucker) [configure.ac] Bug #1203: Add missing '[', which causes problems
2884 with autoconf 2.60. Patch from vapier at gentoo.org.
2885
9c04d67d 288620060625
2887 - (dtucker) [channels.c serverloop.c] Apply the bug #1102 workaround to ptys
2888 only, otherwise sshd can hang exiting non-interactive sessions.
2889
795aa5f5 289020060624
2891 - (dtucker) [configure.ac] Bug #1193: Define PASSWD_NEEDS_USERNAME on Solaris.
2892 Works around limitation in Solaris' passwd program for changing passwords
2893 where the username is longer than 8 characters. ok djm@
24a87055 2894 - (dtucker) [serverloop.c] Get ifdef/ifndef the right way around for the bug
2895 #1102 workaround.
795aa5f5 2896
e02505e2 289720060623
2898 - (dtucker) [README.platform configure.ac openbsd-compat/port-tun.c] Add
2899 tunnel support for Mac OS X/Darwin via a third-party tun driver. Patch
2900 from reyk@, tested by anil@
ea8c44d9 2901 - (dtucker) [channels.c configure.ac serverloop.c] Bug #1102: Around AIX
2902 4.3.3 ML3 or so, the AIX pty layer starting passing zero-length writes
2903 on the pty slave as zero-length reads on the pty master, which sshd
2904 interprets as the descriptor closing. Since most things don't do zero
2905 length writes this rarely matters, but occasionally it happens, and when
2906 it does the SSH pty session appears to hang, so we add a special case for
2907 this condition. ok djm@
e02505e2 2908
6cba36fd 290920060613
ae410a09 2910 - (djm) [getput.h] This file has been replaced by functions in misc.c
6cba36fd 2911 - OpenBSD CVS Sync
2912 - djm@cvs.openbsd.org 2006/05/08 10:49:48
2913 [sshconnect2.c]
2914 uint32_t -> u_int32_t (which we use everywhere else)
2915 (Id sync only - portable already had this)
3173dd0d 2916 - markus@cvs.openbsd.org 2006/05/16 09:00:00
2917 [clientloop.c]
2918 missing free; from Kylene Hall
2b8dc5e3 2919 - markus@cvs.openbsd.org 2006/05/17 12:43:34
2920 [scp.c sftp.c ssh-agent.c ssh-keygen.c sshconnect.c]
2921 fix leak; coverity via Kylene Jo Hall
18c60a0b 2922 - miod@cvs.openbsd.org 2006/05/18 21:27:25
2923 [kexdhc.c kexgexc.c]
2924 paramter -> parameter
07a80cea 2925 - dtucker@cvs.openbsd.org 2006/05/29 12:54:08
2926 [ssh_config.5]
2927 Add gssapi-with-mic to PreferredAuthentications default list; ok jmc
aa195106 2928 - dtucker@cvs.openbsd.org 2006/05/29 12:56:33
2929 [ssh_config]
f127d8a4 2930 Add GSSAPIAuthentication and GSSAPIDelegateCredentials to examples in
2931 sample ssh_config. ok markus@
2932 - jmc@cvs.openbsd.org 2006/05/29 16:10:03
2933 [ssh_config.5]
2934 oops - previous was too long; split the list of auths up
ed277f5e 2935 - mk@cvs.openbsd.org 2006/05/30 11:46:38
2936 [ssh-add.c]
2937 Sync usage() with man page and reality.
2938 ok deraadt dtucker
2939 - jmc@cvs.openbsd.org 2006/05/29 16:13:23
2940 [ssh.1]
2941 add GSSAPI to the list of authentication methods supported;
f9579ee9 2942 - mk@cvs.openbsd.org 2006/05/30 11:46:38
2943 [ssh-add.c]
2944 Sync usage() with man page and reality.
2945 ok deraadt dtucker
211f229e 2946 - markus@cvs.openbsd.org 2006/06/01 09:21:48
2947 [sshd.c]
2948 call get_remote_ipaddr() early; fixes logging after client disconnects;
2949 report mpf@; ok dtucker@
82aeee5d 2950 - markus@cvs.openbsd.org 2006/06/06 10:20:20
2951 [readpass.c sshconnect.c sshconnect.h sshconnect2.c uidswap.c]
2952 replace remaining setuid() calls with permanently_set_uid() and
2953 check seteuid() return values; report Marcus Meissner; ok dtucker djm
3c33c1b6 2954 - markus@cvs.openbsd.org 2006/06/08 14:45:49
2955 [readpass.c sshconnect.c sshconnect2.c uidswap.c uidswap.h]
2956 do not set the gid, noted by solar; ok djm
e1ff5445 2957 - djm@cvs.openbsd.org 2006/06/13 01:18:36
2958 [ssh-agent.c]
2959 always use a format string, even when printing a constant
2960 - djm@cvs.openbsd.org 2006/06/13 02:17:07
2961 [ssh-agent.c]
2962 revert; i am on drugs. spotted by alexander AT beard.se
6cba36fd 2963
2ae7f715 296420060521
2965 - (dtucker) [auth.c monitor.c] Now that we don't log from both the monitor
2966 and slave, we can remove the special-case handling in the audit hook in
2967 auth_log.
2968
296920060517
aee28e67 2970 - (dtucker) [ssh-rand-helper.c] Check return code of mkdir and fix file
2971 pointer leak. From kjhall at us.ibm.com, found by coverity.
2972
2ae7f715 297320060515
a048aeba 2974 - (dtucker) [openbsd-compat/getrrsetbyname.c] Use _compat_res instead of
2975 _res, prevents problems on some platforms that have _res as a global but
2976 don't have getrrsetbyname(), eg IRIX 5.3. Found and tested by
2977 georg.schwarz at freenet.de, ok djm@.
143a79db 2978 - (dtucker) [defines.h] Find a value for IOV_MAX or use a conservative
2979 default. Patch originally from tim@, ok djm
5aa56df0 2980 - (dtucker) [auth-pam.c] Bug #1188: pass result of do_pam_account back and
2981 do not allow kbdint again after the PAM account check fails. ok djm@
a048aeba 2982
2ae7f715 298320060506
689d3f77 2984 - (dtucker) OpenBSD CVS Sync
fc231518 2985 - dtucker@cvs.openbsd.org 2006/04/25 08:02:27
2986 [authfile.c authfile.h sshconnect2.c ssh.c sshconnect1.c]
2987 Prevent ssh from trying to open private keys with bad permissions more than
2988 once or prompting for their passphrases (which it subsequently ignores
2989 anyway), similar to a previous change in ssh-add. bz #1186, ok djm@
397d64d2 2990 - djm@cvs.openbsd.org 2006/05/04 14:55:23
2991 [dh.c]
2992 tighter DH exponent checks here too; feedback and ok markus@
a1361c4b 2993 - djm@cvs.openbsd.org 2006/04/01 05:37:46
2994 [OVERVIEW]
2995 $OpenBSD$ in here too
9188927d 2996 - dtucker@cvs.openbsd.org 2006/05/06 08:35:40
2997 [auth-krb5.c]
2998 Add $OpenBSD$ in comment here too
fc231518 2999
01d35895 300020060504
3001 - (dtucker) [auth-pam.c groupaccess.c monitor.c monitor_wrap.c scard-opensc.c
3002 session.c ssh-rand-helper.c sshd.c openbsd-compat/bsd-cygwin_util.c
3003 openbsd-compat/setproctitle.c] Convert malloc(foo*bar) -> calloc(foo,bar)
3004 in Portable-only code; since calloc zeros, remove now-redundant memsets.
3005 Also add a couple of sanity checks. With & ok djm@
3006
7ca4010c 300720060503
3008 - (dtucker) [packet.c] Remove in_systm.h since it's also in includes.h
3009 and double including it on IRIX 5.3 causes problems. From Georg Schwarz,
3010 "no objections" tim@
3011
ac93e676 301220060423
3013 - (djm) OpenBSD CVS Sync
3014 - deraadt@cvs.openbsd.org 2006/04/01 05:42:20
3015 [scp.c]
3016 minimal lint cleanup (unused crud, and some size_t); ok djm
c0a8e7bb 3017 - djm@cvs.openbsd.org 2006/04/01 05:50:29
3018 [scp.c]
3019 xasprintification; ok deraadt@
5fe9ca7d 3020 - djm@cvs.openbsd.org 2006/04/01 05:51:34
3021 [atomicio.c]
3022 ANSIfy; requested deraadt@
3023 - dtucker@cvs.openbsd.org 2006/04/02 08:34:52
3024 [ssh-keysign.c]
3025 sessionid can be 32 bytes now too when sha256 kex is used; ok djm@
9c3c8eb1 3026 - djm@cvs.openbsd.org 2006/04/03 07:10:38
3027 [gss-genr.c]
3028 GSSAPI buffers shouldn't be nul-terminated, spotted in bugzilla #1066
3029 by dleonard AT vintela.com. use xasprintf() to simplify code while in
3030 there; "looks right" deraadt@
69d9d413 3031 - djm@cvs.openbsd.org 2006/04/16 00:48:52
3032 [buffer.c buffer.h channels.c]
3033 Fix condition where we could exit with a fatal error when an input
3034 buffer became too large and the remote end had advertised a big window.
3035 The problem was a mismatch in the backoff math between the channels code
3036 and the buffer code, so make a buffer_check_alloc() function that the
3037 channels code can use to propsectivly check whether an incremental
3038 allocation will succeed. bz #1131, debugged with the assistance of
3039 cove AT wildpackets.com; ok dtucker@ deraadt@
68d86b37 3040 - djm@cvs.openbsd.org 2006/04/16 00:52:55
3041 [atomicio.c atomicio.h]
3042 introduce atomiciov() function that wraps readv/writev to retry
3043 interrupted transfers like atomicio() does for read/write;
3044 feedback deraadt@ dtucker@ stevesk@ ok deraadt@
2c4369de 3045 - djm@cvs.openbsd.org 2006/04/16 00:54:10
3046 [sftp-client.c]
3047 avoid making a tiny 4-byte write to send the packet length of sftp
3048 commands, which would result in a separate tiny packet on the wire by
3049 using atomiciov(writev, ...) to write the length and the command in one
3050 pass; ok deraadt@
7bccebd0 3051 - djm@cvs.openbsd.org 2006/04/16 07:59:00
3052 [atomicio.c]
3053 reorder sanity test so that it cannot dereference past the end of the
3054 iov array; well spotted canacar@!
b0a892b2 3055 - dtucker@cvs.openbsd.org 2006/04/18 10:44:28
71544c3d 3056 [bufaux.c bufbn.c Makefile.in]
b0a892b2 3057 Move Buffer bignum functions into their own file, bufbn.c. This means
3058 that sftp and sftp-server (which use the Buffer functions in bufaux.c
3059 but not the bignum ones) no longer need to be linked with libcrypto.
3060 ok markus@
50394f26 3061 - djm@cvs.openbsd.org 2006/04/20 09:27:09
3062 [auth.h clientloop.c dispatch.c dispatch.h kex.h]
3063 replace the last non-sig_atomic_t flag used in a signal handler with a
3064 sig_atomic_t, unfortunately with some knock-on effects in other (non-
3065 signal) contexts in which it is used; ok markus@
4439dde1 3066 - markus@cvs.openbsd.org 2006/04/20 09:47:59
3067 [sshconnect.c]
3068 simplify; ok djm@
6e97fe1d 3069 - djm@cvs.openbsd.org 2006/04/20 21:53:44
3070 [includes.h session.c sftp.c]
3071 Switch from using pipes to socketpairs for communication between
3072 sftp/scp and ssh, and between sshd and its subprocesses. This saves
3073 a file descriptor per session and apparently makes userland ppp over
3074 ssh work; ok markus@ deraadt@ (ID Sync only - portable makes this
3075 decision on a per-platform basis)
40402a68 3076 - djm@cvs.openbsd.org 2006/04/22 04:06:51
3077 [uidswap.c]
3078 use setres[ug]id() to permanently revoke privileges; ok deraadt@
3079 (ID Sync only - portable already uses setres[ug]id() whenever possible)
ae3afe05 3080 - stevesk@cvs.openbsd.org 2006/04/22 18:29:33
3081 [crc32.c]
3082 remove extra spaces
0ca1dcaf 3083 - (djm) [auth.h dispatch.h kex.h] sprinkle in signal.h to get
3084 sig_atomic_t
ac93e676 3085
ef4d1846 308620060421
3087 - (djm) [Makefile.in configure.ac session.c sshpty.c]
3088 [contrib/redhat/sshd.init openbsd-compat/Makefile.in]
3089 [openbsd-compat/openbsd-compat.h openbsd-compat/port-linux.c]
3090 [openbsd-compat/port-linux.h] Add support for SELinux, setting
3091 the execution and TTY contexts. based on patch from Daniel Walsh,
3092 bz #880; ok dtucker@
3093
88680c8b 309420060418
ef4d1846 3095 - (djm) [canohost.c] Reorder IP options check so that it isn't broken
3096 by mapped addresses; bz #1179 reported by markw wtech-llc.com;
88680c8b 3097 ok dtucker@
3098
6a0984b4 309920060331
3100 - OpenBSD CVS Sync
3101 - deraadt@cvs.openbsd.org 2006/03/27 01:21:18
3102 [xmalloc.c]
3103 we can do the size & nmemb check before the integer overflow check;
3104 evol
fd06fbe0 3105 - deraadt@cvs.openbsd.org 2006/03/27 13:03:54
3106 [dh.c]
3107 use strtonum() instead of atoi(), limit dhg size to 64k; ok djm
e56b07ea 3108 - djm@cvs.openbsd.org 2006/03/27 23:15:46
3109 [sftp.c]
3110 always use a format string for addargs; spotted by mouring@
19e79961 3111 - deraadt@cvs.openbsd.org 2006/03/28 00:12:31
3112 [README.tun ssh.c]
3113 spacing
4f16046f 3114 - deraadt@cvs.openbsd.org 2006/03/28 01:52:28
3115 [channels.c]
3116 do not accept unreasonable X ports numbers; ok djm
cfaa5405 3117 - deraadt@cvs.openbsd.org 2006/03/28 01:53:43
3118 [ssh-agent.c]
3119 use strtonum() to parse the pid from the file, and range check it
3120 better; ok djm
04aa9e67 3121 - djm@cvs.openbsd.org 2006/03/30 09:41:25
3122 [channels.c]
3123 ARGSUSED for dispatch table-driven functions
51e7a012 3124 - djm@cvs.openbsd.org 2006/03/30 09:58:16
3125 [authfd.c bufaux.c deattack.c gss-serv.c mac.c misc.c misc.h]
3126 [monitor_wrap.c msg.c packet.c sftp-client.c sftp-server.c ssh-agent.c]
3127 replace {GET,PUT}_XXBIT macros with functionally similar functions,
3128 silencing a heap of lint warnings. also allows them to use
3129 __bounded__ checking which can't be applied to macros; requested
3130 by and feedback from deraadt@
8cffe22a 3131 - djm@cvs.openbsd.org 2006/03/30 10:41:25
3132 [ssh.c ssh_config.5]
3133 add percent escape chars to the IdentityFile option, bz #1159 based
3134 on a patch by imaging AT math.ualberta.ca; feedback and ok dtucker@
2ccf5424 3135 - dtucker@cvs.openbsd.org 2006/03/30 11:05:17
3136 [ssh-keygen.c]
3137 Correctly handle truncated files while converting keys; ok djm@
c023a130 3138 - dtucker@cvs.openbsd.org 2006/03/30 11:40:21
3139 [auth.c monitor.c]
3140 Prevent duplicate log messages when privsep=yes; ok djm@
99d18e3e 3141 - jmc@cvs.openbsd.org 2006/03/31 09:09:30
3142 [ssh_config.5]
3143 kill trailing whitespace;
b4d7dedd 3144 - djm@cvs.openbsd.org 2006/03/31 09:13:56
3145 [ssh_config.5]
3146 remote user escape is %r not %h; spotted by jmc@
6a0984b4 3147
3eff92ec 314820060326
3149 - OpenBSD CVS Sync
3150 - jakob@cvs.openbsd.org 2006/03/15 08:46:44
3151 [ssh-keygen.c]
3152 if no key file are given when printing the DNS host record, use the
3153 host key file(s) as default. ok djm@
d6157b67 3154 - biorn@cvs.openbsd.org 2006/03/16 10:31:45
3155 [scp.c]
3156 Try to display errormessage even if remout == -1
3157 ok djm@, markus@
9dfca510 3158 - djm@cvs.openbsd.org 2006/03/17 22:31:50
3159 [authfd.c]
3160 another unreachable found by lint
60ffd527 3161 - djm@cvs.openbsd.org 2006/03/17 22:31:11
3162 [authfd.c]
3163 unreachanble statement, found by lint
4113a1d7 3164 - djm@cvs.openbsd.org 2006/03/19 02:22:32
3165 [serverloop.c]
3166 memory leaks detected by Coverity via elad AT netbsd.org;
3167 ok deraadt@ dtucker@
e6a3cfb5 3168 - djm@cvs.openbsd.org 2006/03/19 02:22:56
3169 [sftp.c]
3170 more memory leaks detected by Coverity via elad AT netbsd.org;
3171 deraadt@ ok
f8f9ef4d 3172 - djm@cvs.openbsd.org 2006/03/19 02:23:26
3173 [hostfile.c]
3174 FILE* leak detected by Coverity via elad AT netbsd.org;
3175 ok deraadt@
88299971 3176 - djm@cvs.openbsd.org 2006/03/19 02:24:05
3177 [dh.c readconf.c servconf.c]
3178 potential NULL pointer dereferences detected by Coverity
3179 via elad AT netbsd.org; ok deraadt@
18fc231c 3180 - djm@cvs.openbsd.org 2006/03/19 07:41:30
3181 [sshconnect2.c]
3182 memory leaks detected by Coverity via elad AT netbsd.org;
3183 deraadt@ ok
0f8cd5a6 3184 - dtucker@cvs.openbsd.org 2006/03/19 11:51:52
3185 [servconf.c]
3186 Correct strdelim null test; ok djm@
c8e9c167 3187 - deraadt@cvs.openbsd.org 2006/03/19 18:52:11
3188 [auth1.c authfd.c channels.c]
3189 spacing
b4bbf172 3190 - deraadt@cvs.openbsd.org 2006/03/19 18:53:12
3191 [kex.c kex.h monitor.c myproposal.h session.c]
3192 spacing
3efa8ea9 3193 - deraadt@cvs.openbsd.org 2006/03/19 18:56:41
3194 [clientloop.c progressmeter.c serverloop.c sshd.c]
3195 ARGSUSED for signal handlers
6e56dc92 3196 - deraadt@cvs.openbsd.org 2006/03/19 18:59:49
3197 [ssh-keyscan.c]
3198 please lint
7de98c39 3199 - deraadt@cvs.openbsd.org 2006/03/19 18:59:30
3200 [ssh.c]
3201 spacing
c84ac6a4 3202 - deraadt@cvs.openbsd.org 2006/03/19 18:59:09
3203 [authfile.c]
3204 whoever thought that break after return was a good idea needs to
3205 get their head examimed
98d40a74 3206 - djm@cvs.openbsd.org 2006/03/20 04:09:44
3207 [monitor.c]
3208 memory leaks detected by Coverity via elad AT netbsd.org;
3209 deraadt@ ok
3210 that should be all of them now
7016f7cf 3211 - djm@cvs.openbsd.org 2006/03/20 11:38:46
3212 [key.c]
3213 (really) last of the Coverity diffs: avoid possible NULL deref in
3214 key_free. via elad AT netbsd.org; markus@ ok
5ef36928 3215 - deraadt@cvs.openbsd.org 2006/03/20 17:10:19
3216 [auth.c key.c misc.c packet.c ssh-add.c]
3217 in a switch (), break after return or goto is stupid
353d48db 3218 - deraadt@cvs.openbsd.org 2006/03/20 17:13:16
3219 [key.c]
3220 djm did a typo
952fce1b 3221 - deraadt@cvs.openbsd.org 2006/03/20 17:17:23
3222 [ssh-rsa.c]
3223 in a switch (), break after return or goto is stupid
148de80c 3224 - deraadt@cvs.openbsd.org 2006/03/20 18:14:02
b3b6f53d 3225 [channels.c clientloop.c monitor_wrap.c monitor_wrap.h serverloop.c]
3226 [ssh.c sshpty.c sshpty.h]
148de80c 3227 sprinkle u_int throughout pty subsystem, ok markus
fe8c3af1 3228 - deraadt@cvs.openbsd.org 2006/03/20 18:17:20
3229 [auth1.c auth2.c sshd.c]
3230 sprinkle some ARGSUSED for table driven functions (which sometimes
3231 must ignore their args)
32596c7b 3232 - deraadt@cvs.openbsd.org 2006/03/20 18:26:55
3233 [channels.c monitor.c session.c session.h ssh-agent.c ssh-keygen.c]
3234 [ssh-rsa.c ssh.c sshlogin.c]
3235 annoying spacing fixes getting in the way of real diffs
b248a875 3236 - deraadt@cvs.openbsd.org 2006/03/20 18:27:50
3237 [monitor.c]
3238 spacing
338eb2ab 3239 - deraadt@cvs.openbsd.org 2006/03/20 18:35:12
3240 [channels.c]
3241 x11_fake_data is only ever used as u_char *
0bcc3e35 3242 - deraadt@cvs.openbsd.org 2006/03/20 18:41:43
3243 [dns.c]
3244 cast xstrdup to propert u_char *
9555d258 3245 - deraadt@cvs.openbsd.org 2006/03/20 18:42:27
3246 [canohost.c match.c ssh.c sshconnect.c]
3247 be strict with tolower() casting
a7137f6b 3248 - deraadt@cvs.openbsd.org 2006/03/20 18:48:34
3249 [channels.c fatal.c kex.c packet.c serverloop.c]
3250 spacing
1cec12db 3251 - deraadt@cvs.openbsd.org 2006/03/20 21:11:53
3252 [ttymodes.c]
3253 spacing
52e3daed 3254 - djm@cvs.openbsd.org 2006/03/25 00:05:41
3255 [auth-bsdauth.c auth-skey.c auth.c auth2-chall.c channels.c]
3256 [clientloop.c deattack.c gss-genr.c kex.c key.c misc.c moduli.c]
3257 [monitor.c monitor_wrap.c packet.c scard.c sftp-server.c ssh-agent.c]
3258 [ssh-keyscan.c ssh.c sshconnect.c sshconnect2.c sshd.c uuencode.c]
3259 [xmalloc.c xmalloc.h]
3260 introduce xcalloc() and xasprintf() failure-checked allocations
3261 functions and use them throughout openssh
3262
3263 xcalloc is particularly important because malloc(nmemb * size) is a
3264 dangerous idiom (subject to integer overflow) and it is time for it
3265 to die
3266
3267 feedback and ok deraadt@
c5d10563 3268 - djm@cvs.openbsd.org 2006/03/25 01:13:23
3269 [buffer.c channels.c deattack.c misc.c scp.c session.c sftp-client.c]
3270 [sftp-server.c ssh-agent.c ssh-rsa.c xmalloc.c xmalloc.h auth-pam.c]
3271 [uidswap.c]
3272 change OpenSSH's xrealloc() function from being xrealloc(p, new_size)
3273 to xrealloc(p, new_nmemb, new_itemsize).
3274
3275 realloc is particularly prone to integer overflows because it is
3276 almost always allocating "n * size" bytes, so this is a far safer
3277 API; ok deraadt@
522327f5 3278 - djm@cvs.openbsd.org 2006/03/25 01:30:23
3279 [sftp.c]
3280 "abormally" is a perfectly cromulent word, but "abnormally" is better
c1cb7bae 3281 - djm@cvs.openbsd.org 2006/03/25 13:17:03
6ba5f28f 3282 [atomicio.c auth-bsdauth.c auth-chall.c auth-options.c auth-passwd.c]
3283 [auth-rh-rsa.c auth-rhosts.c auth-rsa.c auth-skey.c auth.c auth1.c]
3284 [auth2-chall.c auth2-hostbased.c auth2-kbdint.c auth2-none.c]
3285 [auth2-passwd.c auth2-pubkey.c auth2.c authfd.c authfile.c bufaux.c]
3286 [buffer.c canohost.c channels.c cipher-3des1.c cipher-bf1.c]
3287 [cipher-ctr.c cipher.c cleanup.c clientloop.c compat.c compress.c]
3288 [deattack.c dh.c dispatch.c fatal.c groupaccess.c hostfile.c kex.c]
3289 [kexdh.c kexdhc.c kexdhs.c kexgex.c kexgexc.c kexgexs.c key.c log.c]
3290 [mac.c match.c md-sha256.c misc.c monitor.c monitor_fdpass.c]
3291 [monitor_mm.c monitor_wrap.c msg.c nchan.c packet.c progressmeter.c]
3292 [readconf.c readpass.c rsa.c scard.c scp.c servconf.c serverloop.c]
3293 [session.c sftp-client.c sftp-common.c sftp-glob.c sftp-server.c]
3294 [sftp.c ssh-add.c ssh-agent.c ssh-dss.c ssh-keygen.c ssh-keyscan.c]
3295 [ssh-keysign.c ssh-rsa.c ssh.c sshconnect.c sshconnect1.c]
3296 [sshconnect2.c sshd.c sshlogin.c sshpty.c sshtty.c ttymodes.c]
3297 [uidswap.c uuencode.c xmalloc.c]
c1cb7bae 3298 Put $OpenBSD$ tags back (as comments) to replace the RCSID()s that
3299 Theo nuked - our scripts to sync -portable need them in the files
febd6f21 3300 - deraadt@cvs.openbsd.org 2006/03/25 18:29:35
3301 [auth-rsa.c authfd.c packet.c]
3302 needed casts (always will be needed)
b476adfa 3303 - deraadt@cvs.openbsd.org 2006/03/25 18:30:55
3304 [clientloop.c serverloop.c]
3305 spacing
306f24ca 3306 - deraadt@cvs.openbsd.org 2006/03/25 18:36:15
3307 [sshlogin.c sshlogin.h]
3308 nicer size_t and time_t types
0fe9892f 3309 - deraadt@cvs.openbsd.org 2006/03/25 18:40:14
3310 [ssh-keygen.c]
3311 cast strtonum() result to right type
8d0b0353 3312 - deraadt@cvs.openbsd.org 2006/03/25 18:41:45
3313 [ssh-agent.c]
3314 mark two more signal handlers ARGSUSED
d6d4897e 3315 - deraadt@cvs.openbsd.org 2006/03/25 18:43:30
3316 [channels.c]
3317 use strtonum() instead of atoi() [limit X screens to 400, sorry]
15dd2c4f 3318 - deraadt@cvs.openbsd.org 2006/03/25 18:56:55
3319 [bufaux.c channels.c packet.c]
3320 remove (char *) casts to a function that accepts void * for the arg
5b5f6af7 3321 - deraadt@cvs.openbsd.org 2006/03/25 18:58:10
3322 [channels.c]
3323 delete cast not required
56f824f3 3324 - djm@cvs.openbsd.org 2006/03/25 22:22:43
3325 [atomicio.h auth-options.h auth.h auth2-gss.c authfd.h authfile.h]
3326 [bufaux.h buffer.h canohost.h channels.h cipher.h clientloop.h]
3327 [compat.h compress.h crc32.c crc32.h deattack.h dh.h dispatch.h]
3328 [dns.c dns.h getput.h groupaccess.h gss-genr.c gss-serv-krb5.c]
3329 [gss-serv.c hostfile.h includes.h kex.h key.h log.h mac.h match.h]
3330 [misc.h monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h msg.h]
3331 [myproposal.h packet.h pathnames.h progressmeter.h readconf.h rsa.h]
3332 [scard.h servconf.h serverloop.h session.h sftp-common.h sftp.h]
3333 [ssh-gss.h ssh.h ssh1.h ssh2.h sshconnect.h sshlogin.h sshpty.h]
3334 [ttymodes.h uidswap.h uuencode.h xmalloc.h]
3335 standardise spacing in $OpenBSD$ tags; requested by deraadt@
9594740b 3336 - deraadt@cvs.openbsd.org 2006/03/26 01:31:48
3337 [uuencode.c]
3338 typo
3eff92ec 3339
df938409 334020060325
3341 - OpenBSD CVS Sync
3342 - djm@cvs.openbsd.org 2006/03/16 04:24:42
3343 [ssh.1]
3344 Add RFC4419 (Diffie-Hellman group exchange KEX) to the list of SSH RFCs
3345 that OpenSSH supports
a92a0909 3346 - deraadt@cvs.openbsd.org 2006/03/19 18:51:18
3347 [atomicio.c auth-bsdauth.c auth-chall.c auth-krb5.c auth-options.c]
3348 [auth-pam.c auth-passwd.c auth-rh-rsa.c auth-rhosts.c auth-rsa.c]
3349 [auth-shadow.c auth-skey.c auth.c auth1.c auth2-chall.c]
3350 [auth2-hostbased.c auth2-kbdint.c auth2-none.c auth2-passwd.c]
3351 [auth2-pubkey.c auth2.c authfd.c authfile.c bufaux.c buffer.c]
3352 [canohost.c channels.c cipher-3des1.c cipher-acss.c cipher-aes.c]
3353 [cipher-bf1.c cipher-ctr.c cipher.c cleanup.c clientloop.c compat.c]
3354 [compress.c deattack.c dh.c dispatch.c dns.c entropy.c fatal.c]
3355 [groupaccess.c hostfile.c includes.h kex.c kexdh.c kexdhc.c]
3356 [kexdhs.c kexgex.c kexgexc.c kexgexs.c key.c log.c loginrec.c]
3357 [loginrec.h logintest.c mac.c match.c md-sha256.c md5crypt.c misc.c]
3358 [monitor.c monitor_fdpass.c monitor_mm.c monitor_wrap.c msg.c]
3359 [nchan.c packet.c progressmeter.c readconf.c readpass.c rsa.c]
3360 [scard.c scp.c servconf.c serverloop.c session.c sftp-client.c]
3361 [sftp-common.c sftp-glob.c sftp-server.c sftp.c ssh-add.c]
3362 [ssh-agent.c ssh-dss.c ssh-keygen.c ssh-keyscan.c ssh-keysign.c]
3363 [ssh-rand-helper.c ssh-rsa.c ssh.c sshconnect.c sshconnect1.c]
3364 [sshconnect2.c sshd.c sshlogin.c sshpty.c sshtty.c ttymodes.c]
3365 [uidswap.c uuencode.c xmalloc.c openbsd-compat/bsd-arc4random.c]
3366 [openbsd-compat/bsd-closefrom.c openbsd-compat/bsd-cygwin_util.c]
3367 [openbsd-compat/bsd-getpeereid.c openbsd-compat/bsd-misc.c]
3368 [openbsd-compat/bsd-nextstep.c openbsd-compat/bsd-snprintf.c]
3369 [openbsd-compat/bsd-waitpid.c openbsd-compat/fake-rfc2553.c]
3370 RCSID() can die
0e03e3d0 3371 - deraadt@cvs.openbsd.org 2006/03/19 18:53:12
3372 [kex.h myproposal.h]
3373 spacing
0fa53840 3374 - djm@cvs.openbsd.org 2006/03/20 04:07:22
3375 [auth2-gss.c]
3376 GSSAPI related leaks detected by Coverity via elad AT netbsd.org;
3377 reviewed by simon AT sxw.org.uk; deraadt@ ok
0926fd19 3378 - djm@cvs.openbsd.org 2006/03/20 04:07:49
3379 [gss-genr.c]
3380 more GSSAPI related leaks detected by Coverity via elad AT netbsd.org;
3381 reviewed by simon AT sxw.org.uk; deraadt@ ok
7cd30d48 3382 - djm@cvs.openbsd.org 2006/03/20 04:08:18
3383 [gss-serv.c]
3384 last lot of GSSAPI related leaks detected by Coverity via
3385 elad AT netbsd.org; reviewed by simon AT sxw.org.uk; deraadt@ ok
97f67e9a 3386 - deraadt@cvs.openbsd.org 2006/03/20 18:14:02
3387 [monitor_wrap.h sshpty.h]
3388 sprinkle u_int throughout pty subsystem, ok markus
fd6eaa8c 3389 - deraadt@cvs.openbsd.org 2006/03/20 18:26:55
3390 [session.h]
3391 annoying spacing fixes getting in the way of real diffs
6cfe93ec 3392 - deraadt@cvs.openbsd.org 2006/03/20 18:41:43
3393 [dns.c]
3394 cast xstrdup to propert u_char *
f0eea41f 3395 - jakob@cvs.openbsd.org 2006/03/22 21:16:24
3396 [ssh.1]
3397 simplify SSHFP example; ok jmc@
69753336 3398 - djm@cvs.openbsd.org 2006/03/22 21:27:15
3399 [deattack.c deattack.h]
3400 remove IV support from the CRC attack detector, OpenSSH has never used
3401 it - it only applied to IDEA-CFB, which we don't support.
3402 prompted by NetBSD Coverity report via elad AT netbsd.org;
3403 feedback markus@ "nuke it" deraadt@
df938409 3404
08a3f952 340520060318
7f38714e 3406 - (djm) [auth-pam.c] Fix memleak in error path, from Coverity via
3407 elad AT NetBSD.org
3408 - (dtucker) [openbsd-compat/bsd-snprintf.c] Bug #1173: make fmtint() take
3409 a LLONG rather than a long. Fixes scp'ing of large files on platforms
3410 with missing/broken snprintfs. Patch from e.borovac at bom.gov.au.
08a3f952 3411
32b0131a 341220060316
3413 - (dtucker) [entropy.c] Add headers for WIFEXITED and friends.
2f360c89 3414 - (dtucker) [configure.ac md-sha256.c] NetBSD has sha2.h in
3415 /usr/include/crypto. Hint from djm@.
b1f0c612 3416 - (tim) [kex.c myproposal.h md-sha256.c openbsd-compat/sha2.c,h]
3417 Disable sha256 when openssl < 0.9.7. Patch from djm@.
30baf904 3418 - (djm) [kex.c] Slightly more clean deactivation of dhgex-sha256 on old
3419 OpenSSL; ok tim
32b0131a 3420
0ac58ab4 342120060315
3422 - (djm) OpenBSD CVS Sync:
3423 - msf@cvs.openbsd.org 2006/02/06 15:54:07
3424 [ssh.1]
3425 - typo fix
3426 ok jmc@
260c414c 3427 - jmc@cvs.openbsd.org 2006/02/06 21:44:47
3428 [ssh.1]
3429 make this a little less ambiguous...
c38f5d19 3430 - stevesk@cvs.openbsd.org 2006/02/07 01:08:04
3431 [auth-rhosts.c includes.h]
3432 move #include <netgroup.h> out of includes.h; ok markus@
c3ff311a 3433 - stevesk@cvs.openbsd.org 2006/02/07 01:18:09
3434 [includes.h ssh-agent.c ssh-keyscan.c sshconnect2.c]
3435 move #include <sys/queue.h> out of includes.h; ok markus@
1d3e026f 3436 - stevesk@cvs.openbsd.org 2006/02/07 01:42:00
3437 [channels.c clientloop.c clientloop.h includes.h packet.h]
3438 [serverloop.c sshpty.c sshpty.h sshtty.c ttymodes.c]
3439 move #include <termios.h> out of includes.h; ok markus@
99f28949 3440 - stevesk@cvs.openbsd.org 2006/02/07 01:52:50
3441 [sshtty.c]
3442 "log.h" not needed
cc63c340 3443 - stevesk@cvs.openbsd.org 2006/02/07 03:47:05
3444 [hostfile.c]
3445 "packet.h" not needed
db5a9db9 3446 - stevesk@cvs.openbsd.org 2006/02/07 03:59:20
3447 [deattack.c]
3448 duplicate #include
a75f5360 3449 - stevesk@cvs.openbsd.org 2006/02/08 12:15:27
3450 [auth.c clientloop.c includes.h misc.c monitor.c readpass.c]
3451 [session.c sftp.c ssh-agent.c ssh-keysign.c ssh.c sshconnect.c]
3452 [sshd.c sshpty.c]
3453 move #include <paths.h> out of includes.h; ok markus@
6425cf65 3454 - stevesk@cvs.openbsd.org 2006/02/08 12:32:49
3455 [includes.h misc.c]
3456 move #include <netinet/tcp.h> out of includes.h; ok markus@
1720c23b 3457 - stevesk@cvs.openbsd.org 2006/02/08 13:15:44
3458 [gss-serv.c monitor.c]
3459 small KNF
5b984d1d 3460 - stevesk@cvs.openbsd.org 2006/02/08 14:16:59
3461 [sshconnect.c]
3462 <openssl/bn.h> not needed
876faccd 3463 - stevesk@cvs.openbsd.org 2006/02/08 14:31:30
3464 [includes.h ssh-agent.c ssh-keyscan.c ssh.c]
3465 move #include <sys/resource.h> out of includes.h; ok markus@
a3dcf543 3466 - stevesk@cvs.openbsd.org 2006/02/08 14:38:18
3467 [includes.h packet.c]
3468 move #include <netinet/in_systm.h> and <netinet/ip.h> out of
3469 includes.h; ok markus@
68e39d38 3470 - stevesk@cvs.openbsd.org 2006/02/08 23:51:24
3471 [includes.h scp.c sftp-glob.c sftp-server.c]
3472 move #include <dirent.h> out of includes.h; ok markus@
bbb1501d 3473 - stevesk@cvs.openbsd.org 2006/02/09 00:32:07
3474 [includes.h]
3475 #include <sys/endian.h> not needed; ok djm@
3476 NB. ID Sync only - we still need this (but it may move later)
4eb67845 3477 - jmc@cvs.openbsd.org 2006/02/09 10:10:47
3478 [sshd.8]
3479 - move some text into a CAVEATS section
3480 - merge the COMMAND EXECUTION... section into AUTHENTICATION
bd7c69ea 3481 - stevesk@cvs.openbsd.org 2006/02/10 00:27:13
3482 [channels.c clientloop.c includes.h misc.c progressmeter.c sftp.c]
3483 [ssh.c sshd.c sshpty.c]
3484 move #include <sys/ioctl.h> out of includes.h; ok markus@
aa2eae64 3485 - stevesk@cvs.openbsd.org 2006/02/10 01:44:27
3486 [includes.h monitor.c readpass.c scp.c serverloop.c session.c\7f]
3487 [sftp.c sshconnect.c sshconnect2.c sshd.c]
3488 move #include <sys/wait.h> out of includes.h; ok markus@
cfb9181c 3489 - otto@cvs.openbsd.org 2006/02/11 19:31:18
3490 [atomicio.c]
3491 type correctness; from Ray Lai in PR 5011; ok millert@
f7b8224d 3492 - djm@cvs.openbsd.org 2006/02/12 06:45:34
3493 [ssh.c ssh_config.5]
3494 add a %l expansion code to the ControlPath, which is filled in with the
3495 local hostname at runtime. Requested by henning@ to avoid some problems
3496 with /home on NFS; ok dtucker@
129d5252 3497 - djm@cvs.openbsd.org 2006/02/12 10:44:18
3498 [readconf.c]
3499 raise error when the user specifies a RekeyLimit that is smaller than 16
3500 (the smallest of our cipher's blocksize) or big enough to cause integer
3501 wraparound; ok & feedback dtucker@
5e7007ea 3502 - jmc@cvs.openbsd.org 2006/02/12 10:49:44
3503 [ssh_config.5]
3504 slight rewording; ok djm
010c04e5 3505 - jmc@cvs.openbsd.org 2006/02/12 10:52:41
3506 [sshd.8]
3507 rework the description of authorized_keys a little;
9ed4bd80 3508 - jmc@cvs.openbsd.org 2006/02/12 17:57:19
3509 [sshd.8]
3510 sort the list of options permissable w/ authorized_keys;
3511 ok djm dtucker
1e0fcfc6 3512 - jmc@cvs.openbsd.org 2006/02/13 10:16:39
3513 [sshd.8]
3514 no need to subsection the authorized_keys examples - instead, convert
3515 this to look like an actual file. also use proto 2 keys, and use IETF
3516 example addresses;
2881e0e9 3517 - jmc@cvs.openbsd.org 2006/02/13 10:21:25
3518 [sshd.8]
3519 small tweaks for the ssh_known_hosts section;
9d4b0313 3520 - jmc@cvs.openbsd.org 2006/02/13 11:02:26
3521 [sshd.8]
3522 turn this into an example ssh_known_hosts file; ok djm
481e991f 3523 - jmc@cvs.openbsd.org 2006/02/13 11:08:43
3524 [sshd.8]
3525 - avoid nasty line split
3526 - `*' does not need to be escaped
10fa86ae 3527 - jmc@cvs.openbsd.org 2006/02/13 11:27:25
3528 [sshd.8]
3529 sort FILES and use a -compact list;
2db34ac9 3530 - david@cvs.openbsd.org 2006/02/15 05:08:24
3531 [sftp-client.c]
3532 typo in comment; ok djm@
0e505e42 3533 - jmc@cvs.openbsd.org 2006/02/15 16:53:20
3534 [ssh.1]
3535 remove the IETF draft references and replace them with some updated RFCs;
2866aceb 3536 - jmc@cvs.openbsd.org 2006/02/15 16:55:33
3537 [sshd.8]
3538 remove ietf draft references; RFC list now maintained in ssh.1;
00e7c607 3539 - jmc@cvs.openbsd.org 2006/02/16 09:05:34
3540 [sshd.8]
3541 sync some of the FILES entries w/ ssh.1;
f3d2d92e 3542 - jmc@cvs.openbsd.org 2006/02/19 19:52:10
3543 [sshd.8]
3544 move the sshrc stuff out of FILES, and into its own section:
3545 FILES is not a good place to document how stuff works;
e56bbe08 3546 - jmc@cvs.openbsd.org 2006/02/19 20:02:17
3547 [sshd.8]
3548 sync the (s)hosts.equiv FILES entries w/ those from ssh.1;
3783659a 3549 - jmc@cvs.openbsd.org 2006/02/19 20:05:00
3550 [sshd.8]
3551 grammar;
922f8f17 3552 - jmc@cvs.openbsd.org 2006/02/19 20:12:25
3553 [ssh_config.5]
3554 add some vertical space;
cebb4c24 3555 - stevesk@cvs.openbsd.org 2006/02/20 16:36:15
3556 [authfd.c channels.c includes.h session.c ssh-agent.c ssh.c]
3557 move #include <sys/un.h> out of includes.h; ok djm@
4095f623 3558 - stevesk@cvs.openbsd.org 2006/02/20 17:02:44
3559 [clientloop.c includes.h monitor.c progressmeter.c scp.c]
3560 [serverloop.c session.c sftp.c ssh-agent.c ssh.c sshd.c]
3561 move #include <signal.h> out of includes.h; ok markus@
ada68823 3562 - stevesk@cvs.openbsd.org 2006/02/20 17:19:54
3563 [auth-rhosts.c auth-rsa.c auth.c auth2-none.c auth2-pubkey.c]
3564 [authfile.c clientloop.c includes.h readconf.c scp.c session.c]
3565 [sftp-client.c sftp-common.c sftp-common.h sftp-glob.c]
3566 [sftp-server.c sftp.c ssh-add.c ssh-keygen.c ssh.c sshconnect.c]
3567 [sshconnect2.c sshd.c sshpty.c]
3568 move #include <sys/stat.h> out of includes.h; ok markus@
b6438382 3569 - stevesk@cvs.openbsd.org 2006/02/22 00:04:45
3570 [canohost.c clientloop.c includes.h match.c readconf.c scp.c ssh.c]
3571 [sshconnect.c]
3572 move #include <ctype.h> out of includes.h; ok djm@
95d46d8f 3573 - jmc@cvs.openbsd.org 2006/02/24 10:25:14
3574 [ssh_config.5]
3575 add section on patterns;
3576 from dtucker + myself
ac1ec4d8 3577 - jmc@cvs.openbsd.org 2006/02/24 10:33:54
3578 [sshd_config.5]
3579 signpost to PATTERNS;
436a5ff9 3580 - jmc@cvs.openbsd.org 2006/02/24 10:37:07
3581 [ssh_config.5]
3582 tidy up the refs to PATTERNS;
4cb23985 3583 - jmc@cvs.openbsd.org 2006/02/24 10:39:52
3584 [sshd.8]
3585 signpost to PATTERNS section;
340a4caf 3586 - jmc@cvs.openbsd.org 2006/02/24 20:22:16
3587 [ssh-keysign.8 ssh_config.5 sshd_config.5]
3588 some consistency fixes;
f09ffbdb 3589 - jmc@cvs.openbsd.org 2006/02/24 20:31:31
3590 [ssh.1 ssh_config.5 sshd.8 sshd_config.5]
3591 more consistency fixes;
c5786b30 3592 - jmc@cvs.openbsd.org 2006/02/24 23:20:07
3593 [ssh_config.5]
3594 some grammar/wording fixes;
b74c3b8c 3595 - jmc@cvs.openbsd.org 2006/02/24 23:43:57
3596 [sshd_config.5]
3597 some grammar/wording fixes;
32cfd177 3598 - jmc@cvs.openbsd.org 2006/02/24 23:51:17
3599 [sshd_config.5]
3600 oops - bits i missed;
2963b207 3601 - jmc@cvs.openbsd.org 2006/02/25 12:26:17
3602 [ssh_config.5]
3603 document the possible values for KbdInteractiveDevices;
84c1b530 3604 help/ok dtucker
3605 - jmc@cvs.openbsd.org 2006/02/25 12:28:34
3606 [sshd_config.5]
3607 document the order in which allow/deny directives are processed;
a269663f 3608 help/ok dtucker
de4f5093 3609 - jmc@cvs.openbsd.org 2006/02/26 17:17:18
3610 [ssh_config.5]
3611 move PATTERNS to the end of the main body; requested by dtucker
ef1c6497 3612 - jmc@cvs.openbsd.org 2006/02/26 18:01:13
3613 [sshd_config.5]
3614 subsection is pointless here;
c04ba6a6 3615 - jmc@cvs.openbsd.org 2006/02/26 18:03:10
3616 [ssh_config.5]
3617 comma;
8b6bf4d5 3618 - djm@cvs.openbsd.org 2006/02/28 01:10:21
3619 [session.c]
3620 fix logout recording when privilege separation is disabled, analysis and
3621 patch from vinschen at redhat.com; tested by dtucker@ ok deraadt@
3622 NB. ID sync only - patch already in portable
140000b4 3623 - djm@cvs.openbsd.org 2006/03/04 04:12:58
3624 [serverloop.c]
3625 move a debug() outside of a signal handler; ok markus@ a little while back
16a5525d 3626 - djm@cvs.openbsd.org 2006/03/12 04:23:07
3627 [ssh.c]
3628 knf nit
9f513268 3629 - djm@cvs.openbsd.org 2006/03/13 08:16:00
3630 [sshd.c]
3631 don't log that we are listening on a socket before the listen() call
3632 actually succeeds, bz #1162 reported by Senthil Kumar; ok dtucker@
71f0de56 3633 - dtucker@cvs.openbsd.org 2006/03/13 08:33:00
3634 [packet.c]
3635 Set TCP_NODELAY for all connections not just "interactive" ones. Fixes
3636 poor performance and protocol stalls under some network conditions (mindrot
3637 bugs #556 and #981). Patch originally from markus@, ok djm@
15b81af3 3638 - dtucker@cvs.openbsd.org 2006/03/13 08:43:16
3639 [ssh-keygen.c]
3640 Make ssh-keygen handle CR and CRLF line termination when converting IETF
3641 format keys, in adition to vanilla LF. mindrot #1157, tested by Chris
3642 Pepper, ok djm@
533b9133 3643 - dtucker@cvs.openbsd.org 2006/03/13 10:14:29
3644 [misc.c ssh_config.5 sshd_config.5]
3645 Allow config directives to contain whitespace by surrounding them by double
3646 quotes. mindrot #482, man page help from jmc@, ok djm@
45660a22 3647 - dtucker@cvs.openbsd.org 2006/03/13 10:26:52
3648 [authfile.c authfile.h ssh-add.c]
3649 Make ssh-add check file permissions before attempting to load private
3650 key files multiple times; it will fail anyway and this prevents confusing
3651 multiple prompts and warnings. mindrot #1138, ok djm@
22aa23f8 3652 - djm@cvs.openbsd.org 2006/03/14 00:15:39
3653 [canohost.c]
3654 log the originating address and not just the name when a reverse
3655 mapping check fails, requested by linux AT linuon.com
2d762582 3656 - markus@cvs.openbsd.org 2006/03/14 16:32:48
3657 [ssh_config.5 sshd_config.5]
3658 *AliveCountMax applies to protcol v2 only; ok dtucker, djm
2ff8003a 3659 - djm@cvs.openbsd.org 2006/03/07 09:07:40
3660 [kex.c kex.h monitor.c myproposal.h ssh-keyscan.c sshconnect2.c sshd.c]
3661 Implement the diffie-hellman-group-exchange-sha256 key exchange method
3662 using the SHA256 code in libc (and wrapper to make it into an OpenSSL
3663 EVP), interop tested against CVS PuTTY
3664 NB. no portability bits committed yet
13ff27b7 3665 - (djm) [configure.ac defines.h kex.c md-sha256.c]
3666 [openbsd-compat/sha2.h openbsd-compat/openbsd-compat.h]
3667 [openbsd-compat/sha2.c] First stab at portability glue for SHA256
3668 KEX support, should work with libc SHA256 support or OpenSSL
3669 EVP_sha256 if present
1a6e2ed1 3670 - (djm) [includes.h] Restore accidentally dropped netinet/in.h
d3c45531 3671 - (djm) [Makefile.in openbsd-compat/Makefile.in] Add added files
f73e2ad7 3672 - (djm) [md-sha256.c configure.ac] md-sha256.c needs sha2.h if present
53a9f480 3673 - (djm) [regress/.cvsignore] Ignore Makefile here
81e73e57 3674 - (djm) [loginrec.c] Need stat.h
6c3a432e 3675 - (djm) [openbsd-compat/sha2.h] Avoid include macro clash with
3676 system sha2.h
cb2c6179 3677 - (djm) [ssh-rand-helper.c] Needs a bunch of headers
3e598f1a 3678 - (djm) [ssh-agent.c] Restore dropped stat.h
3070c7e1 3679 - (djm) [openbsd-compat/sha2.h openbsd-compat/sha2.c] Comment out
3680 SHA384, which we don't need and doesn't compile without tweaks
b5b88c19 3681 - (djm) [auth-pam.c clientloop.c includes.h monitor.c session.c]
3682 [sftp-client.c ssh-keysign.c ssh.c sshconnect.c sshconnect2.c]
3683 [sshd.c openbsd-compat/bsd-misc.c openbsd-compat/bsd-openpty.c]
3684 [openbsd-compat/glob.c openbsd-compat/mktemp.c]
3685 [openbsd-compat/readpassphrase.c] Lots of include fixes for
3686 OpenSolaris
b481f63d 3687 - (tim) [includes.h] put sys/stat.h back in to quiet some "macro redefined:"
3e9b2b1b 3688 - (tim) [openssh/sshpty.c openssh/openbsd-compat/port-tun.c] put in some
3689 includes removed from includes.h
d90b9f9a 3690 - (dtucker) [configure.ac] Fix glob test conversion to AC_TRY_COMPILE
b02dadfc 3691 - (djm) [includes.h] Put back paths.h, it is needed in defines.h
d4bf5977 3692 - (dtucker) [openbsd-compat/openbsd-compat.h] AIX (at least) needs
3693 sys/ioctl.h for struct winsize.
3919d576 3694 - (dtucker) [configure.ac] login_cap.h requires sys/types.h on NetBSD.
0ac58ab4 3695
055252ed 369620060313
3697 - (dtucker) [configure.ac] Bug #1171: Don't use printf("%lld", longlong)
3698 since not all platforms support it. Instead, use internal equivalent while
3699 computing LLONG_MIN and LLONG_MAX. Remove special case for alpha-dec-osf*
3700 as it's no longer required. Tested by Bernhard Simon, ok djm@
3701
f9b93ff8 370220060304
3703 - (dtucker) [contrib/cygwin/ssh-host-config] Require use of lastlog as a
3704 file rather than directory, required as Cygwin will be importing lastlog(1).
3705 Also tightens up permissions on the file. Patch from vinschen@redhat.com.
a8d3dd47 3706 - (dtucker) [gss-serv-krb5.c] Bug #1166: Correct #ifdefs for gssapi_krb5.h
3707 includes. Patch from gentoo.riverrat at gmail.com.
f9b93ff8 3708
49c64dd6 370920060226
3710 - (dtucker) [configure.ac] Bug #1156: QNX apparently needs SSHD_ACQUIRES_CTTY
3711 patch from kraai at ftbfs.org.
3712
371320060223
05059810 3714 - (dtucker) [sshd_config sshd_config.5] Update UsePAM to reflect current
3715 reality. Pointed out by tryponraj at gmail.com.
3716
49c64dd6 371720060222
0244ad55 3718 - (dtucker) [openbsd-compat/openssl-compat.{c,h}] Minor tidy up: only
3719 compile in compat code if required.
3720
15101d77 372120060221
3722 - (dtucker) [openbsd-compat/openssl-compat.h] Prevent warning about
3723 redefinition of SSLeay_add_all_algorithms.
3724
c7ad0d99 372520060220
3726 - (dtucker) [INSTALL configure.ac openbsd-compat/openssl-compat.{c,h}]
3727 Add optional enabling of OpenSSL's (hardware) Engine support, via
3728 configure --with-ssl-engine. Based in part on a diff by michal at
3729 logix.cz.
3730
46096a5b 373120060219
3732 - (dtucker) [Makefile.in configure.ac, added openbsd-compat/regress/]
3733 Add first attempt at regress tests for compat library. ok djm@
3734
103ff395 373520060214
3736 - (tim) [buildpkg.sh.in] Make the names consistent.
3737 s/pkg_post_make_install_fixes.sh/pkg-post-make-install-fixes.sh/ OK dtucker@
3738
06a517d4 373920060212
3740 - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Make loop counter unsigned
3741 to silence compiler warning, from vinschen at redhat.com.
0c7e8877 3742 - (tim) [configure.ac] Bug #1149. Disable /etc/default/login check for QNX.
9603096f 3743 - (dtucker) [README version.h contrib/caldera/openssh.spec
3744 contrib/redhat/openssh.spec contrib/suse/openssh.spec] Bump version
3745 strings to match 4.3p2 release.
06a517d4 3746
4c721c3d 374720060208
3748 - (tim) [session.c] Logout records were not updated on systems with
3749 post auth privsep disabled due to bug 1086 changes. Analysis and patch
3750 by vinschen at redhat.com. OK tim@, dtucker@.
4b2cf3f1 3751 - (dtucker) [configure.ac] Typo in Ultrix and NewsOS sections (NEED_SETPRGP
8753ef06 3752 -> NEED_SETPGRP), reported by Bernhard Simon. ok tim@
4c721c3d 3753
5679f14d 375420060206
3755 - (tim) [configure.ac] Remove unnecessary tests for net/if.h and
3756 netinet/in_systm.h. OK dtucker@.
3757
823221b2 375820060205
3759 - (tim) [configure.ac] Add AC_REVISION. Add sys/time.h to lastlog.h test
3760 for Solaris. OK dtucker@.
9c54c067 3761 - (tim) [configure.ac] Bug #1149. Changes in QNX section only. Patch by
3762 kraai at ftbfs.org.
823221b2 3763
c9ecc3c7 376420060203
3765 - (tim) [configure.ac] test for egrep (AC_PROG_EGREP) before first
3766 AC_CHECK_HEADERS test. Without it, if AC_CHECK_HEADERS is first run
3767 by a platform specific check, builtin standard includes tests will be
3768 skipped on the other platforms.
3769 Analysis and suggestion by vinschen at redhat.com, patch by dtucker@.
3770 OK tim@, djm@.
3771
300ea548 377220060202
3773 - (dtucker) [configure.ac] Bug #1148: Fix "crippled AES" test so that it
3774 works with picky compilers. Patch from alex.kiernan at thus.net.
3775
0ceedd4e 377620060201
3777 - (djm) [regress/test-exec.sh] Try 'logname' as well as 'whoami' to
3778 determine the user's login name - needed for regress tests on Solaris
3779 10 and OpenSolaris
f3906047 3780 - (djm) OpenBSD CVS Sync
3781 - jmc@cvs.openbsd.org 2006/02/01 09:06:50
3782 [sshd.8]
3783 - merge sections on protocols 1 and 2 into a single section
3784 - remove configuration file section
3785 ok markus
170c69ba 3786 - jmc@cvs.openbsd.org 2006/02/01 09:11:41
3787 [sshd.8]
3788 small tweak;
026be201 3789 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
3790 [contrib/suse/openssh.spec] Update versions ahead of release
ac07067e 3791 - markus@cvs.openbsd.org 2006/02/01 11:27:22
3792 [version.h]
3793 openssh 4.3
2ac31303 3794 - (djm) Release OpenSSH 4.3p1
0ceedd4e 3795
0ce89457 379620060131
3797 - (djm) OpenBSD CVS Sync
3798 - jmc@cvs.openbsd.org 2006/01/20 11:21:45
3799 [ssh_config.5]
3800 - word change, agreed w/ markus
3801 - consistency fixes
ec63d7ce 3802 - jmc@cvs.openbsd.org 2006/01/25 09:04:34
3803 [sshd.8]
3804 move the options description up the page, and a few additional tweaks
3805 whilst in here;
3806 ok markus
f464b2f1 3807 - jmc@cvs.openbsd.org 2006/01/25 09:07:22
3808 [sshd.8]
3809 move subsections to full sections;
b661b7fb 3810 - jmc@cvs.openbsd.org 2006/01/26 08:47:56
3811 [ssh.1]
3812 add a section on verifying host keys in dns;
3813 written with a lot of help from jakob;
3814 feedback dtucker/markus;
3815 ok markus
d7b37427 3816 - reyk@cvs.openbsd.org 2006/01/30 12:22:22
3817 [channels.c]
3818 mark channel as write failed or dead instead of read failed on error
3819 of the channel output filter.
3820 ok markus@
062d2977 3821 - jmc@cvs.openbsd.org 2006/01/30 13:37:49
3822 [ssh.1]
3823 remove an incorrect sentence;
3824 reported by roumen petrov;
3825 ok djm markus
4116f5c0 3826 - djm@cvs.openbsd.org 2006/01/31 10:19:02
3827 [misc.c misc.h scp.c sftp.c]
3828 fix local arbitrary command execution vulnerability on local/local and
3829 remote/remote copies (CVE-2006-0225, bz #1094), patch by
3830 t8m AT centrum.cz, polished by dtucker@ and myself; ok markus@
16e8ab10 3831 - djm@cvs.openbsd.org 2006/01/31 10:35:43
3832 [scp.c]
3833 "scp a b c" shouldn't clobber "c" when it is not a directory, report and
3834 fix from biorn@; ok markus@
b645ff66 3835 - (djm) Sync regress tests to OpenBSD:
3836 - dtucker@cvs.openbsd.org 2005/03/10 10:20:39
3837 [regress/forwarding.sh]
3838 Regress test for ClearAllForwardings (bz #994); ok markus@
9b347e5f 3839 - dtucker@cvs.openbsd.org 2005/04/25 09:54:09
3840 [regress/multiplex.sh]
3841 Don't call cleanup in multiplex as test-exec will cleanup anyway
3842 found by tim@, ok djm@
3843 NB. ID sync only, we already had this
3844 - djm@cvs.openbsd.org 2005/05/20 23:14:15
3845 [regress/test-exec.sh]
3846 force addressfamily=inet for tests, unbreaking dynamic-forward regress for
3847 recently committed nc SOCKS5 changes
9f22d634 3848 - djm@cvs.openbsd.org 2005/05/24 04:10:54
89deb4c2 3849 [regress/try-ciphers.sh]
9f22d634 3850 oops, new arcfour modes here too
89deb4c2 3851 - markus@cvs.openbsd.org 2005/06/30 11:02:37
3852 [regress/scp.sh]
3853 allow SUDO=sudo; from Alexander Bluhm
41f70006 3854 - grunk@cvs.openbsd.org 2005/11/14 21:25:56
3855 [regress/agent-getpeereid.sh]
3856 all other scripts in this dir use $SUDO, not 'sudo', so pull this even
3857 ok markus@
71133d5b 3858 - dtucker@cvs.openbsd.org 2005/12/14 04:36:39
3859 [regress/scp-ssh-wrapper.sh]
3860 Fix assumption about how many args scp will pass; ok djm@
3861 NB. ID sync only, we already had this
452613c1 3862 - djm@cvs.openbsd.org 2006/01/27 06:49:21
3863 [scp.sh]
3864 regress test for local to local scp copies; ok dtucker@
3ca1f5b0 3865 - djm@cvs.openbsd.org 2006/01/31 10:23:23
3866 [scp.sh]
3867 regression test for CVE-2006-0225 written by dtucker@
d5b44cf1 3868 - djm@cvs.openbsd.org 2006/01/31 10:36:33
3869 [scp.sh]
3870 regress test for "scp a b c" where "c" is not a directory
0ce89457 3871
eeb27c78 387220060129
3873 - (dtucker) [configure.ac opensshd.init.in] Bug #1144: Use /bin/sh for the
3874 opensshd.init script interpretter if /sbin/sh does not exist. ok tim@
3875
16ad260d 387620060120
3877 - (dtucker) OpenBSD CVS Sync
3878 - jmc@cvs.openbsd.org 2006/01/15 17:37:05
3879 [ssh.1]
3880 correction from deraadt
43a7d9e7 3881 - jmc@cvs.openbsd.org 2006/01/18 10:53:29
3882 [ssh.1]
3883 add a section on ssh-based vpn, based on reyk's README.tun;
db175906 3884 - dtucker@cvs.openbsd.org 2006/01/20 00:14:55
3885 [scp.1 ssh.1 ssh_config.5 sftp.1]
3886 Document RekeyLimit. Based on patch from jan.iven at cern.ch from mindrot
3887 #1056 with feedback from jmc, djm and markus; ok jmc@ djm@
16ad260d 3888
aaa18db9 388920060114
3890 - (djm) OpenBSD CVS Sync
3891 - jmc@cvs.openbsd.org 2006/01/06 13:27:32
3892 [ssh.1]
3893 weed out some duplicate info in the known_hosts FILES entries;
3894 ok djm
5d7b356f 3895 - jmc@cvs.openbsd.org 2006/01/06 13:29:10
3896 [ssh.1]
3897 final round of whacking FILES for duplicate info, and some consistency
3898 fixes;
3899 ok djm
dbb3bf96 3900 - jmc@cvs.openbsd.org 2006/01/12 14:44:12
3901 [ssh.1]
3902 split sections on tcp and x11 forwarding into two sections.
3903 add an example in the tcp section, based on sth i wrote for ssh faq;
3904 help + ok: djm markus dtucker
5d4e571c 3905 - jmc@cvs.openbsd.org 2006/01/12 18:48:48
3906 [ssh.1]
3907 refer to `TCP' rather than `TCP/IP' in the context of connection
3908 forwarding;
3909 ok markus
e5d4cfad 3910 - jmc@cvs.openbsd.org 2006/01/12 22:20:00
3911 [sshd.8]
3912 refer to TCP forwarding, rather than TCP/IP forwarding;
0b3950af 3913 - jmc@cvs.openbsd.org 2006/01/12 22:26:02
3914 [ssh_config.5]
3915 refer to TCP forwarding, rather than TCP/IP forwarding;
c2da64a1 3916 - jmc@cvs.openbsd.org 2006/01/12 22:34:12
3917 [ssh.1]
3918 back out a sentence - AUTHENTICATION already documents this;
aaa18db9 3919
794febd2 392020060109
3921 - (dtucker) [contrib/cygwin/ssh-host-config] Make sshd service depend on
3922 tcpip service so it's always started after IP is up. Patch from
3923 vinschen at redhat.com.
3924
0624a70b 392520060106
3926 - (djm) OpenBSD CVS Sync
3927 - jmc@cvs.openbsd.org 2006/01/03 16:31:10
3928 [ssh.1]
3929 move FILES to a -compact list, and make each files an item in that list.
3930 this avoids nastly line wrap when we have long pathnames, and treats
3931 each file as a separate item;
3932 remove the .Pa too, since it is useless.
0502727e 3933 - jmc@cvs.openbsd.org 2006/01/03 16:35:30
3934 [ssh.1]
3935 use a larger width for the ENVIRONMENT list;
f403d7b5 3936 - jmc@cvs.openbsd.org 2006/01/03 16:52:36
3937 [ssh.1]
3938 put FILES in some sort of order: sort by pathname
c0907b37 3939 - jmc@cvs.openbsd.org 2006/01/03 16:55:18
3940 [ssh.1]
3941 tweak the description of ~/.ssh/environment
f3119772 3942 - jmc@cvs.openbsd.org 2006/01/04 18:42:46
3943 [ssh.1]
3944 chop out some duplication in the .{r,s}hosts/{h,sh}osts.equiv FILES
3945 entries;
3946 ok markus
6c276bb9 3947 - jmc@cvs.openbsd.org 2006/01/04 18:45:01
3948 [ssh.1]
3949 remove .Xr's to rsh(1) and telnet(1): they are hardly needed;
926f6a7a 3950 - jmc@cvs.openbsd.org 2006/01/04 19:40:24
3951 [ssh.1]
3952 +.Xr ssh-keyscan 1 ,
ccce91ef 3953 - jmc@cvs.openbsd.org 2006/01/04 19:50:09
3954 [ssh.1]
3955 -.Xr gzip 1 ,
db382686 3956 - djm@cvs.openbsd.org 2006/01/05 23:43:53
3957 [misc.c]
3958 check that stdio file descriptors are actually closed before clobbering
3959 them in sanitise_stdfd(). problems occurred when a lower numbered fd was
3960 closed, but higher ones weren't. spotted by, and patch tested by
3961 Frédéric Olivié
0624a70b 3962
d3506f6d 396320060103
3964 - (djm) [channels.c] clean up harmless merge error, from reyk@
3965
79e46360 396620060103
3967 - (djm) OpenBSD CVS Sync
3968 - jmc@cvs.openbsd.org 2006/01/02 17:09:49
3969 [ssh_config.5 sshd_config.5]
3970 some corrections from michael knudsen;
3971
6f6cd507 397220060102
3973 - (djm) [README.tun] Add README.tun, missed during sync of tun(4) support
4b5e6c81 3974 - (djm) OpenBSD CVS Sync
3975 - jmc@cvs.openbsd.org 2005/12/31 10:46:17
3976 [ssh.1]
3977 merge the "LOGIN SESSION AND REMOTE EXECUTION" and "SERVER
3978 AUTHENTICATION" sections into "AUTHENTICATION";
3979 some rewording done to make the text read better, plus some
3980 improvements from djm;
3981 ok djm
b92605e1 3982 - jmc@cvs.openbsd.org 2005/12/31 13:44:04
3983 [ssh.1]
3984 clean up ENVIRONMENT a little;
20892533 3985 - jmc@cvs.openbsd.org 2005/12/31 13:45:19
3986 [ssh.1]
3987 .Nm does not require an argument;
1f1fbbd8 3988 - stevesk@cvs.openbsd.org 2006/01/01 08:59:27
3989 [includes.h misc.c]
3990 move <net/if.h>; ok djm@
81c042a3 3991 - stevesk@cvs.openbsd.org 2006/01/01 10:08:48
3992 [misc.c]
3993 no trailing "\n" for debug()
3eee3b86 3994 - djm@cvs.openbsd.org 2006/01/02 01:20:31
3995 [sftp-client.c sftp-common.h sftp-server.c]
3996 use a common max. packet length, no binary change
b1b65311 3997 - reyk@cvs.openbsd.org 2006/01/02 07:53:44
3998 [misc.c]
3999 clarify tun(4) opening - set the mode and bring the interface up. also
4000 (re)sets the tun(4) layer 2 LINK0 flag for existing tunnel interfaces.
4001 suggested and ok by djm@
d141c93d 4002 - jmc@cvs.openbsd.org 2006/01/02 12:31:06
4003 [ssh.1]
4004 start to cut some duplicate info from FILES;
4005 help/ok djm
6f6cd507 4006
0f6cb079 400720060101
4008 - (djm) [Makefile.in configure.ac includes.h misc.c]
4009 [openbsd-compat/port-tun.c openbsd-compat/port-tun.h] Add support
4010 for tunnel forwarding for FreeBSD and NetBSD. NetBSD's support is
4011 limited to IPv4 tunnels only, and most versions don't support the
4012 tap(4) device at all.
b5081213 4013 - (djm) [configure.ac] Fix linux/if_tun.h test
3aef38da 4014 - (djm) [openbsd-compat/port-tun.c] Linux needs linux/if.h too
0f6cb079 4015
1908529f 401620051229
4017 - (djm) OpenBSD CVS Sync
4018 - stevesk@cvs.openbsd.org 2005/12/28 22:46:06
4019 [canohost.c channels.c clientloop.c]
4020 use 'break-in' for consistency; ok deraadt@ ok and input jmc@
c1c6a032 4021 - reyk@cvs.openbsd.org 2005/12/30 15:56:37
4022 [channels.c channels.h clientloop.c]
4023 add channel output filter interface.
4024 ok djm@, suggested by markus@
3da242db 4025 - jmc@cvs.openbsd.org 2005/12/30 16:59:00
4026 [sftp.1]
4027 do not suggest that interactive authentication will work
4028 with the -b flag;
4029 based on a diff from john l. scarfone;
4030 ok djm
f470cf48 4031 - stevesk@cvs.openbsd.org 2005/12/31 01:38:45
4032 [ssh.1]
4033 document -MM; ok djm@
e914f53a 4034 - (djm) [openbsd-compat/port-tun.c openbsd-compat/port-tun.h configure.ac]
4035 [serverloop.c ssh.c openbsd-compat/Makefile.in]
4036 [openbsd-compat/openbsd-compat.h] Implement tun(4) forwarding
4037 compatability support for Linux, diff from reyk@
c40f09ca 4038 - (djm) [configure.ac] Disable Linux tun(4) compat code if linux/tun.h does
4039 not exist
d91775e1 4040 - (djm) [configure.ac] oops, make that linux/if_tun.h
1908529f 4041
b5c428f0 404220051229
4043 - (tim) [buildpkg.sh.in] grep for $SSHDUID instead of $SSHDGID on /etc/passwd
4044
6b0117fd 404520051224
4046 - (djm) OpenBSD CVS Sync
4047 - jmc@cvs.openbsd.org 2005/12/20 21:59:43
4048 [ssh.1]
4049 merge the sections on protocols 1 and 2 into one section on
4050 authentication;
4051 feedback djm dtucker
4052 ok deraadt markus dtucker
5c5546be 4053 - jmc@cvs.openbsd.org 2005/12/20 22:02:50
4054 [ssh.1]
4055 .Ss -> .Sh: subsections have not made this page more readable
e6c7c03e 4056 - jmc@cvs.openbsd.org 2005/12/20 22:09:41
4057 [ssh.1]
4058 move info on ssh return values and config files up into the main
4059 description;
e49f7abd 4060 - jmc@cvs.openbsd.org 2005/12/21 11:48:16
4061 [ssh.1]
4062 -L and -R descriptions are now above, not below, ~C description;
8770ef76 4063 - jmc@cvs.openbsd.org 2005/12/21 11:57:25
4064 [ssh.1]
4065 options now described `above', rather than `later';
6e1e9c73 4066 - jmc@cvs.openbsd.org 2005/12/21 12:53:31
4067 [ssh.1]
4068 -Y does X11 forwarding too;
4069 ok markus
6cd6c442 4070 - stevesk@cvs.openbsd.org 2005/12/21 22:44:26
4071 [sshd.8]
4072 clarify precedence of -p, Port, ListenAddress; ok and help jmc@
0c9851b1 4073 - jmc@cvs.openbsd.org 2005/12/22 10:31:40
4074 [ssh_config.5]
4075 put the description of "UsePrivilegedPort" in the correct place;
9bf41db3 4076 - jmc@cvs.openbsd.org 2005/12/22 11:23:42
4077 [ssh.1]
4078 expand the description of -w somewhat;
4079 help/ok reyk
86131206 4080 - jmc@cvs.openbsd.org 2005/12/23 14:55:53
4081 [ssh.1]
4082 - sync the description of -e w/ synopsis
4083 - simplify the description of -I
4084 - note that -I is only available if support compiled in, and that it
4085 isn't by default
4086 feedback/ok djm@
025fc42e 4087 - jmc@cvs.openbsd.org 2005/12/23 23:46:23
4088 [ssh.1]
4089 less mark up for -c;
678143bd 4090 - djm@cvs.openbsd.org 2005/12/24 02:27:41
4091 [session.c sshd.c]
4092 eliminate some code duplicated in privsep and non-privsep paths, and
4093 explicitly clear SIGALRM handler; "groovy" deraadt@
6b0117fd 4094
a2b1748a 409520051220
4096 - (dtucker) OpenBSD CVS Sync
4097 - reyk@cvs.openbsd.org 2005/12/13 15:03:02
4098 [serverloop.c]
4099 if forced_tun_device is not set, it is -1 and not SSH_TUNID_ANY
442c8b33 4100 - jmc@cvs.openbsd.org 2005/12/16 18:07:08
4101 [ssh.1]
4102 move the option descriptions up the page: start of a restructure;
4103 ok markus deraadt
e426efa9 4104 - jmc@cvs.openbsd.org 2005/12/16 18:08:53
4105 [ssh.1]
4106 simplify a sentence;
28ca205d 4107 - jmc@cvs.openbsd.org 2005/12/16 18:12:22
4108 [ssh.1]
4109 make the description of -c a little nicer;
a55c1733 4110 - jmc@cvs.openbsd.org 2005/12/16 18:14:40
4111 [ssh.1]
4112 signpost the protocol sections;
8918b906 4113 - stevesk@cvs.openbsd.org 2005/12/17 21:13:05
4114 [ssh_config.5 session.c]
4115 spelling: fowarding, fowarded
551ed07c 4116 - stevesk@cvs.openbsd.org 2005/12/17 21:36:42
4117 [ssh_config.5]
4118 spelling: intented -> intended
3aa43b24 4119 - dtucker@cvs.openbsd.org 2005/12/20 04:41:07
4120 [ssh.c]
4121 exit(255) on error to match description in ssh(1); bz #1137; ok deraadt@
a2b1748a 4122
e5146707 412320051219
4124 - (dtucker) [cipher-aes.c cipher-ctr.c cipher.c configure.ac
4125 openbsd-compat/openssl-compat.h] Check for and work around broken AES
4126 ciphers >128bit on (some) Solaris 10 systems. ok djm@
4127
2f89281c 412820051217
4129 - (dtucker) [defines.h] HP-UX system headers define "YES" and "NO" which
4130 scp.c also uses, so undef them here.
31b0732a 4131 - (dtucker) [configure.ac openbsd-compat/bsd-snprintf.c] Bug #1133: Our
4132 snprintf replacement can have a conflicting declaration in HP-UX's system
4133 headers (const vs. no const) so we now check for and work around it. Patch
4134 from the dynamic duo of David Leonard and Ted Percival.
2f89281c 4135
9fed02d8 413620051214
4137 - (dtucker) OpenBSD CVS Sync (regress/)
4138 - dtucker@cvs.openbsd.org 2005/12/30 04:36:39
4139 [regress/scp-ssh-wrapper.sh]
4140 Fix assumption about how many args scp will pass; ok djm@
4141
d7cf99ff 414220051213
4143 - (djm) OpenBSD CVS Sync
4144 - jmc@cvs.openbsd.org 2005/11/30 11:18:27
4145 [ssh.1]
4146 timezone -> time zone
04ac3e62 4147 - jmc@cvs.openbsd.org 2005/11/30 11:45:20
4148 [ssh.1]
4149 avoid ambiguities in describing TZ;
4150 ok djm@
d20f3c9e 4151 - reyk@cvs.openbsd.org 2005/12/06 22:38:28
4152 [auth-options.c auth-options.h channels.c channels.h clientloop.c]
4153 [misc.c misc.h readconf.c readconf.h scp.c servconf.c servconf.h]
4154 [serverloop.c sftp.c ssh.1 ssh.c ssh_config ssh_config.5 sshconnect.c]
4155 [sshconnect.h sshd.8 sshd_config sshd_config.5]
4156 Add support for tun(4) forwarding over OpenSSH, based on an idea and
4157 initial channel code bits by markus@. This is a simple and easy way to
4158 use OpenSSH for ad hoc virtual private network connections, e.g.
4159 administrative tunnels or secure wireless access. It's based on a new
4160 ssh channel and works similar to the existing TCP forwarding support,
4161 except that it depends on the tun(4) network interface on both ends of
4162 the connection for layer 2 or layer 3 tunneling. This diff also adds
4163 support for LocalCommand in the ssh(1) client.
d20f3c9e 4164 ok djm@, markus@, jmc@ (manpages), tested and discussed with others
ceec33f3 4165 - djm@cvs.openbsd.org 2005/12/07 03:52:22
4166 [clientloop.c]
4167 reyk forgot to compile with -Werror (missing header)
985bb789 4168 - jmc@cvs.openbsd.org 2005/12/07 10:52:13
4169 [ssh.1]
4170 - avoid line split in SYNOPSIS
4171 - add args to -w
4172 - kill trailing whitespace
64925c6d 4173 - jmc@cvs.openbsd.org 2005/12/08 14:59:44
4174 [ssh.1 ssh_config.5]
4175 make `!command' a little clearer;
4176 ok reyk
030723f9 4177 - jmc@cvs.openbsd.org 2005/12/08 15:06:29
4178 [ssh_config.5]
4179 keep options in order;
a4f24bf8 4180 - reyk@cvs.openbsd.org 2005/12/08 18:34:11
4181 [auth-options.c includes.h misc.c misc.h readconf.c servconf.c]
4182 [serverloop.c ssh.c ssh_config.5 sshd_config.5 configure.ac]
4183 two changes to the new ssh tunnel support. this breaks compatibility
4184 with the initial commit but is required for a portable approach.
4185 - make the tunnel id u_int and platform friendly, use predefined types.
4186 - support configuration of layer 2 (ethernet) or layer 3
4187 (point-to-point, default) modes. configuration is done using the
4188 Tunnel (yes|point-to-point|ethernet|no) option is ssh_config(5) and
4189 restricted by the PermitTunnel (yes|point-to-point|ethernet|no) option
4190 in sshd_config(5).
4191 ok djm@, man page bits by jmc@
a274ba38 4192 - jmc@cvs.openbsd.org 2005/12/08 21:37:50
4193 [ssh_config.5]
4194 new sentence, new line;
b872f7f0 4195 - markus@cvs.openbsd.org 2005/12/12 13:46:18
4196 [channels.c channels.h session.c]
4197 make sure protocol messages for internal channels are ignored.
4198 allow adjust messages for non-open channels; with and ok djm@
6306853a 4199 - (djm) [misc.c] Disable tunnel code for non-OpenBSD (for now), enable
4200 again by providing a sys_tun_open() function for your platform and
4201 setting the CUSTOM_SYS_TUN_OPEN define. More work is required to match
4202 OpenBSD's tunnel protocol, which prepends the address family to the
4203 packet
d7cf99ff 4204
fbc06315 420520051201
4206 - (djm) [envpass.sh] Remove regress script that was accidentally committed
4207 in top level directory and not noticed for over a year :)
4208
6e94bd72 420920051129
4210 - (tim) [ssh-keygen.c] Move DSA length test after setting default when
4211 bits == 0.
60dc0294 4212 - (dtucker) OpenBSD CVS Sync
4213 - dtucker@cvs.openbsd.org 2005/11/29 02:04:55
4214 [ssh-keygen.c]
4215 Populate default key sizes before checking them; from & ok tim@
e45da4d6 4216 - (tim) [configure.ac sshd.8] Enable locked account check (a "*LK*" string)
4217 for UnixWare.
6e94bd72 4218
b7bb251f 421920051128
4220 - (dtucker) [regress/yes-head.sh] Work around breakage caused by some
4221 versions of GNU head. Based on patch from zappaman at buraphalinux.org
8b396721 4222 - (dtucker) [includes.h] Bug #1122: __USE_GNU is a glibc internal macro, use
4223 _GNU_SOURCE instead. Patch from t8m at centrum.cz.
c6d7b211 4224 - (dtucker) OpenBSD CVS Sync
4225 - dtucker@cvs.openbsd.org 2005/11/28 05:16:53
4226 [ssh-keygen.1 ssh-keygen.c]
4227 Enforce DSA key length of exactly 1024 bits to comply with FIPS-186-2,
4228 increase minumum RSA key size to 768 bits and update man page to reflect
4229 these. Patch originally bz#1119 (senthilkumar_sen at hotpop.com),
4230 ok djm@, grudging ok deraadt@.
98e93fbc 4231 - dtucker@cvs.openbsd.org 2005/11/28 06:02:56
4232 [ssh-agent.1]
4233 Update agent socket path templates to reflect reality, correct xref for
4234 time formats. bz#1121, patch from openssh at roumenpetrov.info, ok djm@
b7bb251f 4235
961c2997 423620051126
4237 - (dtucker) [configure.ac] Bug #1126: AIX 5.2 and 5.3 (and presumably newer,
4238 when they're available) need the real UID set otherwise pam_chauthtok will
4239 set ADMCHG after changing the password, forcing the user to change it
4240 again immediately.
4241
ccc45ee0 424220051125
4243 - (dtucker) [configure.ac] Apply tim's fix for older systems where the
4244 resolver state in resolv.h is "state" not "__res_state". With slight
4245 modification by me to also work on old AIXes. ok djm@
419094c6 4246 - (dtucker) [progressmeter.c scp.c sftp-server.c] Use correct casts for
4247 snprintf formats, fixes warnings on some 64 bit platforms. Patch from
4248 shaw at vranix.com, ok djm@
ccc45ee0 4249
425020051124
9a406e1e 4251 - (djm) [configure.ac openbsd-compat/Makefile.in openbsd-compat/bsd-asprintf.c
4252 openbsd-compat/bsd-snprintf.c openbsd-compat/openbsd-compat.h] Add an
4253 asprintf() implementation, after syncing our {v,}snprintf() implementation
4254 with some extra fixes from Samba's version. With help and debugging from
4255 dtucker and tim; ok dtucker@
d08db6d1 4256 - (dtucker) [configure.ac] Fix typos in comments and AC_SEARCH_LIB argument
4257 order in Reliant Unix block. Patch from johane at lysator.liu.se.
d77c7dff 4258 - (dtucker) [regress/test-exec.sh] Use 1024 bit keys since we generate so
4259 many and use them only once. Speeds up testing on older/slower hardware.
9a406e1e 4260
932ab351 426120051122
4262 - (dtucker) OpenBSD CVS Sync
4263 - deraadt@cvs.openbsd.org 2005/11/12 18:37:59
4264 [ssh-add.c]
4265 space
29accf74 4266 - deraadt@cvs.openbsd.org 2005/11/12 18:38:15
4267 [scp.c]
4268 avoid close(-1), as in rcp; ok cloder
a001f9d7 4269 - millert@cvs.openbsd.org 2005/11/15 11:59:54
4270 [includes.h]
4271 Include sys/queue.h explicitly instead of assuming some other header
4272 will pull it in. At the moment it gets pulled in by sys/select.h
4273 (which ssh has no business including) via event.h. OK markus@
4274 (ID sync only in -portable)
426cef74 4275 - dtucker@cvs.openbsd.org 2005/11/21 09:42:10
4276 [auth-krb5.c]
4277 Perform Kerberos calls even for invalid users to prevent leaking
4278 information about account validity. bz #975, patch originally from
4279 Senthil Kumar, sanity checked by Simon Wilkinson, tested by djm@, biorn@,
4280 ok markus@
18f8ef7a 4281 - dtucker@cvs.openbsd.org 2005/11/22 03:36:03
4282 [hostfile.c]
4283 Correct format/arguments to debug call; spotted by shaw at vranix.com
4284 ok djm@
dfde7f6e 4285 - (dtucker) [loginrec.c] Add casts to prevent compiler warnings, patch
4286 from shaw at vranix.com.
932ab351 4287
60e10887 428820051120
4289 - (dtucker) [openbsd-compat/openssl-compat.h] Add comment explaining what
4290 is going on.
4291
4162eae5 429220051112
4293 - (dtucker) [openbsd-compat/getrrsetbyname.c] Restore Portable-specific
4294 ifdef lost during sync. Spotted by tim@.
f97dc218 4295 - (dtucker) [openbsd-compat/{realpath.c,stroll.c,rresvport.c}] $OpenBSD tag.
eeee8237 4296 - (dtucker) [configure.ac] Use "$AWK" instead of "awk" in gcc version test.
23361281 4297 - (dtucker) [configure.ac] Remove duplicate utimes() check. ok djm@
29aaf112 4298 - (dtucker) [regress/reconfigure.sh] Fix potential race in the reconfigure
4299 test: if sshd takes too long to reconfigure the subsequent connection will
4300 fail. Zap pidfile before HUPing sshd which will rewrite it when it's ready.
4162eae5 4301
e1658b5c 430220051110
b69585d9 4303 - (dtucker) [openbsd-compat/setenv.c] Merge changes for __findenv from
e1658b5c 4304 OpenBSD getenv.c revs 1.4 - 1.8 (ANSIfication of arguments, removal of
4305 "register").
b69585d9 4306 - (dtucker) [openbsd-compat/setenv.c] Make __findenv static, remove
7b2dcf21 4307 unnecessary prototype.
b69585d9 4308 - (dtucker) [openbsd-compat/setenv.c] Sync changes from OpenBSD setenv.c
4309 revs 1.7 - 1.9.
c080bed1 4310 - (dtucker) [auth-krb5.c] Fix -Wsign-compare warning in non-Heimdal path.
4311 Patch from djm@.
dbf07ba2 4312 - (dtucker) [configure.ac] Disable pointer-sign warnings on gcc 4.0+
4313 since they're not useful right now. Patch from djm@.
242652fe 4314 - (dtucker) [openbsd-compat/getgrouplist.c] Sync OpenBSD revs 1.10 - 1.2 (ANSI
4315 prototypes, removal of "register").
432e59f9 4316 - (dtucker) [openbsd-compat/strlcat.c] Sync OpenBSD revs 1.11 - 1.12 (removal
4317 of "register").
f6d4fb87 4318 - (dtucker) [openbsd-compat/{LOTS}] Move the "OPENBSD ORIGINAL" markers to
4319 after the copyright notices. Having them at the top next to the CVSIDs
4320 guarantees a conflict for each and every sync.
e4f65477 4321 - (dtucker) [openbsd-compat/strlcpy.c] Update from OpenBSD 1.8 -> 1.10.
bfd4a832 4322 - (dtucker) [openbsd-compat/sigact.h] Add "OPENBSD ORIGINAL" marker.
bc16ca63 4323 - (dtucker) [openbsd-compat/strmode.c] Update from OpenBSD 1.5 -> 1.7.
4324 Removal of rcsid, "whiteout" inode type.
7dfb4a82 4325 - (dtucker) [openbsd-compat/basename.c] Update from OpenBSD 1.11 -> 1.14.
4326 Removal of rcsid, will no longer strlcpy parts of the string.
d8922805 4327 - (dtucker) [openbsd-compat/strtoll.c] Update from OpenBSD 1.4 -> 1.5.
4ff445f1 4328 - (dtucker) [openbsd-compat/strtoul.c] Update from OpenBSD 1.5 -> 1.7.
e1829842 4329 - (dtucker) [openbsd-compat/readpassphrase.c] Update from OpenBSD 1.16 -> 1.18.
625552b8 4330 - (dtucker) [openbsd-compat/readpassphrase.h] Update from OpenBSD 1.3 -> 1.5.
a65ea33b 4331 - (dtucker) [openbsd-compat/glob.c] Update from OpenBSD 1.22 -> 1.25.
b84a707a 4332 - (dtucker) [openbsd-compat/glob.h] Update from OpenBSD 1.8 -> 1.9.
281bbb02 4333 - (dtucker) [openbsd-compat/getcwd.c] Update from OpenBSD 1.9 -> 1.14.
16d51c41 4334 - (dtucker) [openbsd-compat/getcwd.c] Replace lstat with fstat to match up
4335 with OpenBSD code since we don't support platforms without fstat any more.
b53df919 4336 - (dtucker) [openbsd-compat/inet_aton.c] Update from OpenBSD 1.7 -> 1.9.
68b36828 4337 - (dtucker) [openbsd-compat/inet_ntoa.c] Update from OpenBSD 1.4 -> 1.6.
4338 - (dtucker) [openbsd-compat/inet_ntop.c] Update from OpenBSD 1.5 -> 1.7.
fc1c42f3 4339 - (dtucker) [openbsd-compat/daemon.c] Update from OpenBSD 1.5 -> 1.6.
0695e921 4340 - (dtucker) [openbsd-compat/strsep.c] Update from OpenBSD 1.5 -> 1.6.
3c8f7a26 4341 - (dtucker) [openbsd-compat/daemon.c] Update from OpenBSD 1.10 -> 1.13.
5bf337a5 4342 - (dtucker) [openbsd-compat/mktemp.c] Update from OpenBSD 1.17 -> 1.19.
8c603515 4343 - (dtucker) [openbsd-compat/rresvport.c] Update from OpenBSD 1.6 -> 1.8.
c9d7b187 4344 - (dtucker) [openbsd-compat/bindresvport.c] Add "OPENBSD ORIGINAL" marker.
295034ce 4345 - (dtucker) [openbsd-compat/bindresvport.c] Update from OpenBSD 1.16 -> 1.17.
3e6325a6 4346 - (dtucker) [openbsd-compat/sigact.c] Update from OpenBSD 1.3 -> 1.4.
4347 Id and copyright sync only, there were no substantial changes we need.
8d767ef2 4348 - (dtucker) [openbsd-compat/bsd-closefrom.c openbsd-compat/base64.c]
6bd2d8e5 4349 -Wsign-compare fixes from djm.
e1b4416e 4350 - (dtucker) [openbsd-compat/sigact.h] Update from OpenBSD 1.2 -> 1.3.
4351 Id and copyright sync only, there were no substantial changes we need.
cd595991 4352 - (dtucker) [configure.ac] Try to get the gcc version number in a way that
4353 doesn't change between versions, and use a safer default.
e1658b5c 4354
255d3e00 435520051105
4356 - (djm) OpenBSD CVS Sync
4357 - markus@cvs.openbsd.org 2005/10/07 11:13:57
4358 [ssh-keygen.c]
4359 change DSA default back to 1024, as it's defined for 1024 bits only
4360 and this causes interop problems with other clients. moreover,
4361 in order to improve the security of DSA you need to change more
4362 components of DSA key generation (e.g. the internal SHA1 hash);
4363 ok deraadt
8cd0437d 4364 - djm@cvs.openbsd.org 2005/10/10 10:23:08
4365 [channels.c channels.h clientloop.c serverloop.c session.c]
4366 fix regression I introduced in 4.2: X11 forwardings initiated after
4367 a session has exited (e.g. "(sleep 5; xterm) &") would not start.
4368 bz #1086 reported by t8m AT centrum.cz; ok markus@ dtucker@
442aee3a 4369 - djm@cvs.openbsd.org 2005/10/11 23:37:37
4370 [channels.c]
4371 bz #1076 set SO_REUSEADDR on X11 forwarding listner sockets, preventing
4372 bind() failure when a previous connection's listeners are in TIME_WAIT,
4373 reported by plattner AT inf.ethz.ch; ok dtucker@
b96eade6 4374 - stevesk@cvs.openbsd.org 2005/10/13 14:03:01
4375 [auth2-gss.c gss-genr.c gss-serv.c]
4376 remove unneeded #includes; ok markus@
6e902aec 4377 - stevesk@cvs.openbsd.org 2005/10/13 14:20:37
4378 [gss-serv.c]
4379 spelling in comments
6472fefc 4380 - stevesk@cvs.openbsd.org 2005/10/13 19:08:08
4381 [gss-serv-krb5.c gss-serv.c]
4382 unused declarations; ok deraadt@
4383 (id sync only for gss-serv-krb5.c)
adf8c40b 4384 - stevesk@cvs.openbsd.org 2005/10/13 19:13:41
4385 [dns.c]
4386 unneeded #include, unused declaration, little knf; ok deraadt@
8442cc66 4387 - stevesk@cvs.openbsd.org 2005/10/13 22:24:31
4388 [auth2-gss.c gss-genr.c gss-serv.c monitor.c]
4389 KNF; ok djm@
17318dd6 4390 - stevesk@cvs.openbsd.org 2005/10/14 02:17:59
4391 [ssh-keygen.c ssh.c sshconnect2.c]
4392 no trailing "\n" for log functions; ok djm@
8c4bd764 4393 - stevesk@cvs.openbsd.org 2005/10/14 02:29:37
4394 [channels.c clientloop.c]
4395 free()->xfree(); ok djm@
ed82a2a9 4396 - stevesk@cvs.openbsd.org 2005/10/15 15:28:12
4397 [sshconnect.c]
4398 make external definition static; ok deraadt@
7238b6e4 4399 - stevesk@cvs.openbsd.org 2005/10/17 13:45:05
4400 [dns.c]
4401 fix memory leaks from 2 sources:
4402 1) key_fingerprint_raw()
4403 2) malloc in dns_read_rdata()
4404 ok jakob@
4405 - stevesk@cvs.openbsd.org 2005/10/17 14:01:28
4406 [dns.c]
4407 remove #ifdef LWRES; ok jakob@
8374cf6f 4408 - stevesk@cvs.openbsd.org 2005/10/17 14:13:35
4409 [dns.c dns.h]
4410 more cleanups; ok jakob@
6b0b0d65 4411 - djm@cvs.openbsd.org 2005/10/30 01:23:19
4412 [ssh_config.5]
4413 mention control socket fallback behaviour, reported by
4414 tryponraj AT gmail.com
2995db03 4415 - djm@cvs.openbsd.org 2005/10/30 04:01:03
4416 [ssh-keyscan.c]
4417 make ssh-keygen discard junk from server before SSH- ident, spotted by
4418 dave AT cirt.net; ok dtucker@
aa9bc1de 4419 - djm@cvs.openbsd.org 2005/10/30 04:03:24
4420 [ssh.c]
4421 fix misleading debug message; ok dtucker@
3a85986d 4422 - dtucker@cvs.openbsd.org 2005/10/30 08:29:29
4423 [canohost.c sshd.c]
4424 Check for connections with IP options earlier and drop silently. ok djm@
db98627d 4425 - jmc@cvs.openbsd.org 2005/10/30 08:43:47
4426 [ssh_config.5]
4427 remove trailing whitespace;
7b9b0103 4428 - djm@cvs.openbsd.org 2005/10/30 08:52:18
4429 [clientloop.c packet.c serverloop.c session.c ssh-agent.c ssh-keygen.c]
4430 [ssh.c sshconnect.c sshconnect1.c sshd.c]
4431 no need to escape single quotes in comments, no binary change
bdd3b323 4432 - dtucker@cvs.openbsd.org 2005/10/31 06:15:04
4433 [sftp.c]
4434 Fix sorting with "ls -1" command. From Robert Tsai, "looks right" deraadt@
882c9d5a 4435 - djm@cvs.openbsd.org 2005/10/31 11:12:49
4436 [ssh-keygen.1 ssh-keygen.c]
4437 generate a protocol 2 RSA key by default
6af12d46 4438 - djm@cvs.openbsd.org 2005/10/31 11:48:29
4439 [serverloop.c]
4440 make sure we clean up wtmp, etc. file when we receive a SIGTERM,
4441 SIGINT or SIGQUIT when running without privilege separation (the
4442 normal privsep case is already OK). Patch mainly by dtucker@ and
4443 senthilkumar_sen AT hotpop.com; ok dtucker@
3543c5e1 4444 - jmc@cvs.openbsd.org 2005/10/31 19:55:25
4445 [ssh-keygen.1]
4446 grammar;
0bbbf2a4 4447 - dtucker@cvs.openbsd.org 2005/11/03 13:38:29
4448 [canohost.c]
4449 Cache reverse lookups with and without DNS separately; ok markus@
47e5dc72 4450 - djm@cvs.openbsd.org 2005/11/04 05:15:59
4451 [kex.c kex.h kexdh.c kexdhc.c kexdhs.c kexgex.c kexgexc.c kexgexs.c]
4452 remove hardcoded hash lengths in key exchange code, allowing
4453 implementation of KEX methods with different hashes (e.g. SHA-256);
4454 ok markus@ dtucker@ stevesk@
27e3ef36 4455 - djm@cvs.openbsd.org 2005/11/05 05:01:15
4456 [bufaux.c]
4457 Fix leaks in error paths, bz #1109 and #1110 reported by kremenek AT
4458 cs.stanford.edu; ok dtucker@
e557f3b5 4459 - (dtucker) [README.platform] Add PAM section.
ebb049f1 4460 - (djm) [openbsd-compat/getrrsetbyname.c] Sync to latest OpenBSD version,
4461 resolving memory leak bz#1111 reported by kremenek AT cs.stanford.edu;
4462 ok dtucker@
255d3e00 4463
bd2a0801 446420051102
4465 - (dtucker) [openbsd-compat/bsd-misc.c] Bug #1108: fix broken strdup().
4466 Reported by olavi at ipunplugged.com and antoine.brodin at laposte.net
4467 via FreeBSD.
4468
5097eaa9 446920051030
4470 - (djm) [contrib/suse/openssh.spec contrib/suse/rc.
4471 sshd contrib/suse/sysconfig.ssh] Bug #1106: Updated SuSE spec and init
4472 files from imorgan AT nas.nasa.gov
0a61a240 4473 - (dtucker) [session.c] Bug #1045do not check /etc/nologin when PAM is
4474 enabled, instead allow PAM to handle it. Note that on platforms using PAM,
4475 the pam_nologin module should be added to sshd's session stack in order to
4476 maintain exising behaviour. Based on patch and discussion from t8m at
4477 centrum.cz, ok djm@
5097eaa9 4478
90f15776 447920051025
4480 - (dtucker) [configure.ac] Relocate LLONG_MAX calculation to after the
4481 sizeof(long long) checks, to make fixing bug #1104 easier (no changes
4482 yet).
d75dfaa6 4483 - (dtucker) [configure.ac] Bug #1104: Tru64's printf family doesn't
4484 understand "%lld", even though the compiler has "long long", so handle
4485 it as a special case. Patch tested by mcaskill.scott at epa.gov.
b8bc9d84 4486 - (dtucker) [contrib/cygwin/ssh-user-config] Remove duplicate yes/no
4487 prompt. Patch from vinschen at redhat.com.
90f15776 4488
b0e7249f 448920051017
4490 - (dtucker) [configure.ac] Bug #1097: Fix configure for cross-compiling.
4491 /etc/default/login report and testing from aabaker at iee.org, corrections
4492 from tim@.
4493
8034a348 449420051009
4495 - (dtucker) [configure.ac defines.h openbsd-compat/vis.{c,h}] Sync current
4496 versions from OpenBSD. ok djm@
4497
83f987c3 449820051008
4499 - (dtucker) [configure.ac] Bug #1098: define $MAIL for HP-UX; report from
4500 brian.smith at agilent com.
1012885d 4501 - (djm) [configure.ac] missing 'test' call for -with-Werror test
83f987c3 4502
278f9900 450320051005
4504 - (dtucker) [configure.ac sshd.8] Enable locked account check (a prepended
4505 "*LOCKED*" string) for FreeBSD. Patch jeremie at le-hen.org and
4506 senthilkumar_sen at hotpop.com.
4507
59e5aff5 450820051003
4509 - (dtucker) OpenBSD CVS Sync
4510 - markus@cvs.openbsd.org 2005/09/07 08:53:53
4511 [channels.c]
4512 enforce chanid != NULL; ok djm
b5443199 4513 - markus@cvs.openbsd.org 2005/09/09 19:18:05
4514 [clientloop.c]
4515 typo; from mark at mcs.vuw.ac.nz, bug #1082
fd6168c1 4516 - djm@cvs.openbsd.org 2005/09/13 23:40:07
4517 [sshd.c ssh.c misc.h sftp.c ssh-keygen.c ssh-keysign.c sftp-server.c
4518 scp.c misc.c ssh-keyscan.c ssh-add.c ssh-agent.c]
4519 ensure that stdio fds are attached; ok deraadt@
5ddc5eb4 4520 - djm@cvs.openbsd.org 2005/09/19 11:37:34
4521 [ssh_config.5 ssh.1]
4522 mention ability to specify bind_address for DynamicForward and -D options;
4523 bz#1077 spotted by Haruyama Seigo
d77dd4d7 4524 - djm@cvs.openbsd.org 2005/09/19 11:47:09
4525 [sshd.c]
4526 stop connection abort on rekey with delayed compression enabled when
4527 post-auth privsep is disabled (e.g. when root is logged in); ok dtucker@
67003554 4528 - djm@cvs.openbsd.org 2005/09/19 11:48:10
4529 [gss-serv.c]
4530 typo
37c406a8 4531 - jmc@cvs.openbsd.org 2005/09/19 15:38:27
4532 [ssh.1]
4533 some more .Bk/.Ek to avoid ugly line split;
80e29ee6 4534 - jmc@cvs.openbsd.org 2005/09/19 15:42:44
4535 [ssh.c]
4536 update -D usage here too;
2915e42b 4537 - djm@cvs.openbsd.org 2005/09/19 23:31:31
4538 [ssh.1]
4539 spelling nit from stevesk@
0d3d1077 4540 - djm@cvs.openbsd.org 2005/09/21 23:36:54
4541 [sshd_config.5]
4542 aquire -> acquire, from stevesk@
ae25711b 4543 - djm@cvs.openbsd.org 2005/09/21 23:37:11
4544 [sshd.c]
4545 change label at markus@'s request
8f921a4a 4546 - jaredy@cvs.openbsd.org 2005/09/30 20:34:26
4547 [ssh-keyscan.1]
4548 deploy .An -nosplit; ok jmc
d2130e1f 4549 - dtucker@cvs.openbsd.org 2005/10/03 07:44:42
4550 [canohost.c]
4551 Relocate check_ip_options call to prevent logging of garbage for
4552 connections with IP options set. bz#1092 from David Leonard,
4553 "looks good" deraadt@
1172d361 4554 - (dtucker) [regress/README.regress] Bug #989: Document limitation that scp
4555 is required in the system path for the multiplex test to work.
59e5aff5 4556
bfd17430 455720050930
4558 - (dtucker) [openbsd-compat/openbsd-compat.h] Bug #1096: Add prototype
4559 for strtoll. Patch from o.flebbe at science-computing.de.
cfb60d3a 4560 - (dtucker) [monitor.c] Bug #1087: Send loginmsg to preauth privsep
4561 child during PAM account check without clearing it. This restores the
4562 post-login warnings such as LDAP password expiry. Patch from Tomas Mraz
4563 with help from several others.
bfd17430 4564
140da888 456520050929
4566 - (dtucker) [monitor_wrap.c] Remove duplicate definition of loginmsg
4567 introduced during sync.
4568
4ebacf50 456920050928
4570 - (dtucker) [entropy.c] Use u_char for receiving RNG seed for consistency.
cafa6a80 4571 - (dtucker) [auth-pam.c] Bug #1028: send final non-query messages from
4572 PAM via keyboard-interactive. Patch tested by the folks at Vintela.
4ebacf50 4573
759ab0d9 457420050927
4575 - (dtucker) [entropy.c] Remove unnecessary tests for getuid and geteuid
4576 calls, since they can't possibly fail. ok djm@
72f02ae7 4577 - (dtucker) [entropy.c entropy.h sshd.c] Pass RNG seed to the reexec'ed
4578 process when sshd relies on ssh-random-helper. Should result in faster
4579 logins on systems without a real random device or prngd. ok djm@
759ab0d9 4580
b6c37221 458120050924
4582 - (dtucker) [auth2.c] Move start_pam() calls out of if-else block to remove
4583 duplicate call. ok djm@
4584
bb116c8e 458520050922
4586 - (dtucker) [configure.ac] Use -R linker flag for libedit too; patch from
4587 skeleten at shillest.net.
e47fb473 4588 - (dtucker) [configure.ac] Fix help for --with-opensc; patch from skeleten at
4589 shillest.net.
bb116c8e 4590
3466e002 459120050919
4592 - (tim) [aclocal.m4 configure.ac] Delete acconfig.h and add templates to
4593 AC_DEFINE and AC_DEFINE_UNQUOTED to quiet autoconf 2.59 warning messages.
f666dcfa 4594 ok dtucker@
3466e002 4595
f5555364 459620050912
4597 - (tim) [configure.ac] Bug 1078. Fix --without-kerberos5. Reported by
4598 Mike Frysinger.
4599
d2a3abef 460020050908
4601 - (tim) [defines.h openbsd-compat/port-uw.c] Add long password support to
4602 OpenServer 6 and add osr5bigcrypt support so when someone migrates
4603 passwords between UnixWare and OpenServer they will still work. OK dtucker@
4604
0b202697 4605$Id$
This page took 1.271386 seconds and 5 git commands to generate.